forked from wolfSSL/wolfssl
Merge pull request #2075 from SparkiDev/port_zephyr
Zephyr port of crypto
This commit is contained in:
@@ -22,4 +22,4 @@ include IDE/mynewt/include.am
|
||||
include IDE/Renesas/cs+/Projects/include.am
|
||||
include IDE/Renesas/e2studio/Projects/include.am
|
||||
|
||||
EXTRA_DIST+= IDE/IAR-EWARM IDE/MDK-ARM IDE/MDK5-ARM IDE/MYSQL IDE/LPCXPRESSO IDE/HEXIWEAR IDE/Espressif
|
||||
EXTRA_DIST+= IDE/IAR-EWARM IDE/MDK-ARM IDE/MDK5-ARM IDE/MYSQL IDE/LPCXPRESSO IDE/HEXIWEAR IDE/Espressif IDE/zephyr
|
||||
|
41
IDE/zephyr/README.md
Normal file
41
IDE/zephyr/README.md
Normal file
@@ -0,0 +1,41 @@
|
||||
Zephyr Project Port
|
||||
===================
|
||||
|
||||
## Overview
|
||||
|
||||
This port is for Zephyr Project available [here](https://www.zephyrproject.org/).
|
||||
|
||||
It provides the following zephyr code.
|
||||
|
||||
- zephyr/ext/lib/crypto/wolfssl
|
||||
- wolfssl library
|
||||
- zephyr/samples/crypto/wolfssl_test
|
||||
- wolfcrypt unit test application
|
||||
- zephyr/samples/crypto/wolfssl_tls_sock
|
||||
- socket based sample of TLS
|
||||
- zephyr/samples/crypto/wolfssl_tls_thread
|
||||
- socket based sample of TLS using threads
|
||||
|
||||
## How to setup
|
||||
|
||||
### delopy wolfssl source to mynewt project
|
||||
Specify the path of the mynewt project and execute `wolfssl/IDE/mynewt/setup.sh`.
|
||||
|
||||
```bash
|
||||
./IDE/zephyr/setup.sh /path/to/zephyrproject
|
||||
```
|
||||
|
||||
This script will deploy wolfssl's library code and samples as described in the Overview to the zephyr project.
|
||||
|
||||
## build & test
|
||||
|
||||
build and execute wolfssl_test
|
||||
|
||||
```
|
||||
cd [zephyrproject]/zephyr/samples/crypto/wolfssl_test
|
||||
mkdir build && cd build
|
||||
cmake -GNinja -DBOARD=qemu_x86 ..
|
||||
ninja
|
||||
ninja run
|
||||
```
|
||||
|
122
IDE/zephyr/lib/CMakeLists.txt
Normal file
122
IDE/zephyr/lib/CMakeLists.txt
Normal file
@@ -0,0 +1,122 @@
|
||||
zephyr_interface_library_named(wolfSSL)
|
||||
|
||||
if(CONFIG_WOLFSSL_BUILTIN)
|
||||
target_compile_definitions(wolfSSL INTERFACE
|
||||
WOLFSSL_OPTIONS_FILE="${CONFIG_WOLFSSL_OPTIONS_FILE}"
|
||||
)
|
||||
|
||||
target_include_directories(wolfSSL INTERFACE
|
||||
include
|
||||
settings
|
||||
)
|
||||
|
||||
zephyr_library()
|
||||
zephyr_library_sources(zephyr_init.c)
|
||||
|
||||
zephyr_library_sources(library/src/crl.c)
|
||||
zephyr_library_sources(library/src/internal.c)
|
||||
zephyr_library_sources(library/src/keys.c)
|
||||
zephyr_library_sources(library/src/ocsp.c)
|
||||
zephyr_library_sources(library/src/sniffer.c)
|
||||
zephyr_library_sources(library/src/ssl.c)
|
||||
zephyr_library_sources(library/src/tls13.c)
|
||||
zephyr_library_sources(library/src/tls.c)
|
||||
zephyr_library_sources(library/src/wolfio.c)
|
||||
|
||||
zephyr_library_sources(library/wolfcrypt/src/aes.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/arc4.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/asm.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/asn.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/async.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/blake2b.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/camellia.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/chacha20_poly1305.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/chacha.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/cmac.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/coding.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/compress.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/cpuid.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/cryptocb.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/curve25519.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/des3.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/dh.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/dsa.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/ecc.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/ecc_fp.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/ed25519.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/error.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/fe_low_mem.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/fe_operations.c)
|
||||
#zephyr_library_sources(library/wolfcrypt/src/fips.c)
|
||||
#zephyr_library_sources(library/wolfcrypt/src/fips_test.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/ge_low_mem.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/ge_operations.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/hash.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/hc128.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/hmac.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/idea.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/integer.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/logging.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/md2.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/md4.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/md5.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/memory.c)
|
||||
#zephyr_library_sources(library/wolfcrypt/src/misc.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/pkcs12.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/pkcs7.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/poly1305.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/pwdbased.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/rabbit.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/random.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/ripemd.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/rsa.c)
|
||||
#zephyr_library_sources(library/wolfcrypt/src/selftest.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sha256.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sha3.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sha512.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sha.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/signature.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_arm32.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_arm64.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_armthumb.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_c32.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_c64.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_cortexm.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_int.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/sp_x86_64.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/srp.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/tfm.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/wc_encrypt.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/wc_pkcs11.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/wc_port.c)
|
||||
#zephyr_library_sources(library/wolfcrypt/src/wolfcrypt_first.c)
|
||||
#zephyr_library_sources(library/wolfcrypt/src/wolfcrypt_last.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/wolfevent.c)
|
||||
zephyr_library_sources(library/wolfcrypt/src/wolfmath.c)
|
||||
|
||||
zephyr_library_link_libraries(wolfSSL)
|
||||
|
||||
add_definitions(-DWOLFSSL_USER_SETTINGS)
|
||||
add_definitions(-DWOLFSSL_ZEPHYR)
|
||||
include_directories("library")
|
||||
else()
|
||||
assert(CONFIG_WOLFSSL_LIBRARY "wolfSSL was enabled, but neither BUILTIN or LIBRARY was selected.")
|
||||
|
||||
# NB: CONFIG_WOLFSSL_LIBRARY is not regression tested and is
|
||||
# therefore susceptible to bit rot
|
||||
|
||||
target_include_directories(wolfSSL INTERFACE
|
||||
${CONFIG_WOLFSSL_INSTALL_PATH}
|
||||
)
|
||||
|
||||
zephyr_link_libraries(
|
||||
mbedtls_external
|
||||
-L${CONFIG_WOLFSSL_INSTALL_PATH}
|
||||
gcc
|
||||
)
|
||||
# Lib wolfssl depends on libgcc so to allow
|
||||
# wolfssl to link with gcc we need to ensure it is placed
|
||||
# after wolfssl_external on the linkers command line.
|
||||
endif()
|
||||
|
||||
target_link_libraries(wolfSSL INTERFACE zephyr_interface)
|
85
IDE/zephyr/lib/Kconfig
Normal file
85
IDE/zephyr/lib/Kconfig
Normal file
@@ -0,0 +1,85 @@
|
||||
# Kconfig - Cryptography primitive options for wolfSSL
|
||||
|
||||
#
|
||||
# Copyright (c) 2016 Intel Corporation
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
|
||||
|
||||
menuconfig WOLFSSL
|
||||
bool "wolfSSL Support"
|
||||
help
|
||||
This option enables the wolfSSL cryptography library.
|
||||
|
||||
if WOLFSSL
|
||||
|
||||
choice
|
||||
prompt "Select implementation"
|
||||
default WOLFSSL_BUILTIN
|
||||
|
||||
config WOLFSSL_BUILTIN
|
||||
bool "Enable wolfSSL integrated sources"
|
||||
help
|
||||
Link with local wolfSSL sources instead of external library.
|
||||
|
||||
config WOLFSSL_LIBRARY
|
||||
bool "Enable wolfSSL external library"
|
||||
help
|
||||
This option enables wolfSSL library.
|
||||
|
||||
endchoice
|
||||
|
||||
config WOLFSSL_SETTINGS_FILE
|
||||
string "wolfSSL settings file"
|
||||
depends on WOLFSSL_BUILTIN
|
||||
default "user_settings-tls-generic.h"
|
||||
help
|
||||
Use a specific wolfSSL settings file. The default config file
|
||||
file can be tweaked with Kconfig. The default settings is
|
||||
suitable to communicate with majority of HTTPS servers on the Internet,
|
||||
but has relatively many features enabled. To optimize resources for
|
||||
special TLS usage, use available Kconfig settings, or select an
|
||||
alternative config.
|
||||
|
||||
if WOLFSSL_BUILTIN && WOLFSSL_SETTINGS_FILE = "user_settings-tls-generic.h"
|
||||
source "ext/lib/crypto/wolfssl/Kconfig.tls-generic"
|
||||
endif
|
||||
|
||||
config WOLFSSL_DEBUG
|
||||
bool "wolfSSL debug activation"
|
||||
depends on WOLFSSL_BUILTIN
|
||||
help
|
||||
Enable debugging activation for wolfSSL configuration. If you use
|
||||
wolfSSL/Zephyr integration (e.g. net_app), this will activate debug
|
||||
logging (of the level configured by WOLFSSL_DEBUG_LEVEL).
|
||||
|
||||
config WOLFSSL_INSTALL_PATH
|
||||
string "wolfSSL install path"
|
||||
depends on WOLFSSL_LIBRARY
|
||||
help
|
||||
This option holds the path where the wolfSSL libraries and headers are
|
||||
installed. Make sure this option is properly set when WOLFSSL_LIBRARY
|
||||
is enabled otherwise the build will fail.
|
||||
|
||||
config APP_LINK_WITH_WOLFSSL
|
||||
bool "Link 'app' with WOLFSSL"
|
||||
default y
|
||||
depends on WOLFSSL
|
||||
help
|
||||
Add WOLFSSL header files to the 'app' include path. It may be
|
||||
disabled if the include paths for WOLFSSL are causing aliasing
|
||||
issues for 'app'.
|
||||
|
||||
endif
|
||||
|
272
IDE/zephyr/lib/Kconfig.tls-generic
Normal file
272
IDE/zephyr/lib/Kconfig.tls-generic
Normal file
@@ -0,0 +1,272 @@
|
||||
# Kconfig.tls - TLS/DTLS related options
|
||||
|
||||
#
|
||||
# Copyright (c) 2018 Intel Corporation
|
||||
# Copyright (c) 2018 Nordic Semiconductor ASA
|
||||
#
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
#
|
||||
|
||||
menu "TLS configuration"
|
||||
|
||||
menu "Supported TLS version"
|
||||
|
||||
config WOLFSSL_TLS_VERSION_1_0
|
||||
bool "Enable support for TLS 1.0"
|
||||
select WOLFSSL_ALLOW_TLSV10_ENABLED
|
||||
|
||||
config WOLFSSL_TLS_VERSION_1_1
|
||||
bool "Enable support for TLS 1.1"
|
||||
select WOLFSSL_NO_OLD_TLS_DISABLED
|
||||
|
||||
config WOLFSSL_TLS_VERSION_1_2
|
||||
bool "Enable support for TLS 1.2"
|
||||
default y
|
||||
|
||||
config WOLFSSL_TLS_VERSION_1_3
|
||||
bool "Enable support for TLS 1.3"
|
||||
select WOLFSSL_TLS13_ENABLED
|
||||
|
||||
endmenu
|
||||
|
||||
menu "Ciphersuite configuration"
|
||||
|
||||
comment "Supported key exchange modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ALL_ENABLED
|
||||
bool "Enable all available ciphersuite modes"
|
||||
select WOLFSSL_KEY_EXCHANGE_PSK_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_DHE_PSK_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_RSA_PSK_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_RSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_DHE_RSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
||||
select WOLFSSL_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_PSK_ENABLED
|
||||
bool "Enable the PSK based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_DHE_PSK_ENABLED
|
||||
bool "Enable the DHE-PSK based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||
bool "Enable the ECDHE-PSK based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_RSA_PSK_ENABLED
|
||||
bool "Enable the RSA-PSK based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_RSA_ENABLED
|
||||
bool "Enable the RSA-only based ciphersuite modes"
|
||||
default y
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_DHE_RSA_ENABLED
|
||||
bool "Enable the DHE-RSA based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||
bool "Enable the ECDHE-RSA based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||
bool "Enable the ECDHE-ECDSA based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
||||
bool "Enable the ECDH-ECDSA based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
||||
bool "Enable the ECDH-RSA based ciphersuite modes"
|
||||
|
||||
config WOLFSSL_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||
bool "Enable the ECJPAKE based ciphersuite modes"
|
||||
|
||||
if WOLFSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED || \
|
||||
WOLFSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED || \
|
||||
WOLFSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED || \
|
||||
WOLFSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED || \
|
||||
WOLFSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED || \
|
||||
WOLFSSL_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||
|
||||
comment "Supported elliptic curves"
|
||||
|
||||
config WOLFSSL_ECP_ALL_ENABLED
|
||||
bool "Enable all available elliptic curves"
|
||||
select WOLFSSL_ECP_DP_SECP192R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP192R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP224R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP256R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP384R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP521R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP192K1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP224K1_ENABLED
|
||||
select WOLFSSL_ECP_DP_SECP256K1_ENABLED
|
||||
select WOLFSSL_ECP_DP_BP256R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_BP384R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_BP512R1_ENABLED
|
||||
select WOLFSSL_ECP_DP_CURVE25519_ENABLED
|
||||
select WOLFSSL_ECP_DP_CURVE448_ENABLED
|
||||
select WOLFSSL_ECP_NIST_OPTIM
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP192R1_ENABLED
|
||||
bool "Enable SECP192R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP224R1_ENABLED
|
||||
bool "Enable SECP224R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP256R1_ENABLED
|
||||
bool "Enable SECP256R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP384R1_ENABLED
|
||||
bool "Enable SECP384R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP521R1_ENABLED
|
||||
bool "Enable SECP521R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP192K1_ENABLED
|
||||
bool "Enable SECP192K1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP224K1_ENABLED
|
||||
bool "Enable SECP224K1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_SECP256K1_ENABLED
|
||||
bool "Enable SECP256K1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_BP256R1_ENABLED
|
||||
bool "Enable BP256R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_BP384R1_ENABLED
|
||||
bool "Enable BP384R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_BP512R1_ENABLED
|
||||
bool "Enable BP512R1 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_CURVE25519_ENABLED
|
||||
bool "Enable CURVE25519 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_DP_CURVE448_ENABLED
|
||||
bool "Enable CURVE448 elliptic curve"
|
||||
|
||||
config WOLFSSL_ECP_NIST_OPTIM
|
||||
bool "Enable NSIT curves optimization"
|
||||
|
||||
endif
|
||||
|
||||
comment "Supported cipher modes"
|
||||
|
||||
config WOLFSSL_CIPHER_ALL_ENABLED
|
||||
bool "Enable all available ciphers"
|
||||
select WOLFSSL_CIPHER_AES_ENABLED
|
||||
select WOLFSSL_CIPHER_CAMELLIA_ENABLED
|
||||
select WOLFSSL_CIPHER_DES_ENABLED
|
||||
select WOLFSSL_CIPHER_ARC4_ENABLED
|
||||
select WOLFSSL_CIPHER_CHACHA20_ENABLED
|
||||
select WOLFSSL_CIPHER_BLOWFISH_ENABLED
|
||||
select WOLFSSL_CIPHER_CCM_ENABLED
|
||||
select WOLFSSL_CIPHER_MODE_XTS_ENABLED
|
||||
select WOLFSSL_CIPHER_MODE_GCM_ENABLED
|
||||
select WOLFSSL_CIPHER_CBC_ENABLED
|
||||
select WOLFSSL_CHACHAPOLY_AEAD_ENABLED
|
||||
|
||||
config WOLFSSL_CIPHER_AES_ENABLED
|
||||
bool "Enable the AES block cipher"
|
||||
default y
|
||||
|
||||
config WOLFSSL_AES_ROM_TABLES
|
||||
depends on WOLFSSL_CIPHER_AES_ENABLED
|
||||
bool "Use precomputed AES tables stored in ROM."
|
||||
default y
|
||||
|
||||
config WOLFSSL_CIPHER_CAMELLIA_ENABLED
|
||||
bool "Enable the Camellia block cipher"
|
||||
|
||||
config WOLFSSL_CIPHER_DES_ENABLED
|
||||
bool "Enable the DES block cipher"
|
||||
default y
|
||||
|
||||
config WOLFSSL_CIPHER_ARC4_ENABLED
|
||||
bool "Enable the ARC4 stream cipher"
|
||||
|
||||
config WOLFSSL_CIPHER_CHACHA20_ENABLED
|
||||
bool "Enable the ChaCha20 stream cipher"
|
||||
|
||||
config WOLFSSL_CIPHER_BLOWFISH_ENABLED
|
||||
bool "Enable the Blowfish block cipher"
|
||||
|
||||
config WOLFSSL_CIPHER_CCM_ENABLED
|
||||
bool "Enable the Counter with CBC-MAC (CCM) mode for 128-bit block cipher"
|
||||
depends on WOLFSSL_CIPHER_AES_ENABLED || WOLFSSL_CIPHER_CAMELLIA_ENABLED
|
||||
|
||||
config WOLFSSL_CIPHER_MODE_XTS_ENABLED
|
||||
bool "Enable Xor-encrypt-xor with ciphertext stealing mode (XTS) for AES"
|
||||
depends on WOLFSSL_CIPHER_AES_ENABLED || WOLFSSL_CIPHER_CAMELLIA_ENABLED
|
||||
|
||||
config WOLFSSL_CIPHER_MODE_GCM_ENABLED
|
||||
bool "Enable the Galois/Counter Mode (GCM) for AES"
|
||||
depends on WOLFSSL_CIPHER_AES_ENABLED || WOLFSSL_CIPHER_CAMELLIA_ENABLED
|
||||
|
||||
config WOLFSSL_CIPHER_CBC_ENABLED
|
||||
bool "Enable Cipher Block Chaining mode (CBC) for symmetric ciphers"
|
||||
default y
|
||||
|
||||
config WOLFSSL_CHACHAPOLY_AEAD_ENABLED
|
||||
bool "Enable the ChaCha20-Poly1305 AEAD algorithm"
|
||||
depends on WOLFSSL_CIPHER_CHACHA20_ENABLED || WOLFSSL_MAC_POLY1305_ENABLED
|
||||
|
||||
comment "Supported message authentication methods"
|
||||
|
||||
config WOLFSSL_MAC_ALL_ENABLED
|
||||
bool "Enable all available MAC methods"
|
||||
select WOLFSSL_MAC_MD4_ENABLED
|
||||
select WOLFSSL_MAC_MD5_ENABLED
|
||||
select WOLFSSL_MAC_SHA1_ENABLED
|
||||
select WOLFSSL_MAC_SHA256_ENABLED
|
||||
select WOLFSSL_MAC_SHA512_ENABLED
|
||||
select WOLFSSL_MAC_POLY1305_ENABLED
|
||||
|
||||
config WOLFSSL_MAC_MD4_ENABLED
|
||||
bool "Enable the MD4 hash algorithm"
|
||||
|
||||
config WOLFSSL_MAC_MD5_ENABLED
|
||||
bool "Enable the MD5 hash algorithm"
|
||||
default y
|
||||
|
||||
config WOLFSSL_MAC_SHA1_ENABLED
|
||||
bool "Enable the SHA1 hash algorithm"
|
||||
default y
|
||||
|
||||
config WOLFSSL_MAC_SHA256_ENABLED
|
||||
bool "Enable the SHA-224 and SHA-256 hash algorithms"
|
||||
default y
|
||||
|
||||
config WOLFSSL_MAC_SHA512_ENABLED
|
||||
bool "Enable the SHA-384 and SHA-512 hash algorithms"
|
||||
|
||||
config WOLFSSL_MAC_POLY1305_ENABLED
|
||||
bool "Enable the Poly1305 MAC algorithm"
|
||||
|
||||
endmenu
|
||||
|
||||
comment "Random number generators"
|
||||
|
||||
config WOLFSSL_HMAC_DRBG_ENABLED
|
||||
bool "Enable the HMAC_DRBG random generator"
|
||||
default y
|
||||
|
||||
comment "Other configurations"
|
||||
|
||||
config WOLFSSL_HAVE_ASM
|
||||
bool "Enable use of assembly code"
|
||||
default y
|
||||
help
|
||||
Enable use of assembly code in wolfSSL. This improves the performances
|
||||
of asymetric cryptography, however this might have an impact on the
|
||||
code size.
|
||||
|
||||
config WOLFSSL_USER_SETTTINGS
|
||||
string "User settings file for wolfSSL"
|
||||
help
|
||||
User settings file that contains wolfSSL defines.
|
||||
|
||||
endmenu
|
12
IDE/zephyr/lib/README
Normal file
12
IDE/zephyr/lib/README
Normal file
@@ -0,0 +1,12 @@
|
||||
|
||||
wolfSSL (formerly known as CyaSSL) and wolfCrypt are either licensed for use
|
||||
under the GPLv2 or a standard commercial license. For our users who cannot use
|
||||
wolfSSL under GPLv2, a commercial license to wolfSSL and wolfCrypt is available.
|
||||
Please contact wolfSSL Inc. directly at:
|
||||
|
||||
Email: licensing@wolfssl.com
|
||||
Phone: +1 425 245-8247
|
||||
|
||||
More information can be found on the wolfSSL website at www.wolfssl.com.
|
||||
|
||||
|
64
IDE/zephyr/lib/install_lib.sh
Executable file
64
IDE/zephyr/lib/install_lib.sh
Executable file
@@ -0,0 +1,64 @@
|
||||
#!/bin/sh
|
||||
|
||||
WOLFSSL_SRC_DIR=../../..
|
||||
|
||||
if [ ! -d $WOLFSSL_SRC_DIR ]; then
|
||||
echo "Directory does not exist: $WOLFSSL_SRC_DIR"
|
||||
exit 1
|
||||
fi
|
||||
if [ ! -f $WOLFSSL_SRC_DIR/wolfssl/ssl.h ]; then
|
||||
echo "Missing header file: $WOLFSSL_SRC_DIR/wolfssl/ssl.h"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
ZEPHYR_DIR=
|
||||
if [ $# -ne 1 ]; then
|
||||
echo "Need location of zephyr project as a command line argument"
|
||||
exit 1
|
||||
else
|
||||
ZEPHYR_DIR=$1
|
||||
fi
|
||||
if [ ! -d $ZEPHR_DIR ]; then
|
||||
echo "Zephyr project directory does not exist: $ZEPHYR_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_CRYPTO_DIR=$ZEPHYR_DIR/zephyr/ext/lib/crypto
|
||||
if [ ! -d $ZEPHYR_CRYPTO_DIR ]; then
|
||||
echo "Zephyr crypto directory does not exist: $ZEPHYR_CRYPTO_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_WOLFSSL_DIR=$ZEPHYR_CRYPTO_DIR/wolfssl
|
||||
|
||||
echo "wolfSSL directory in Zephyr:"
|
||||
echo " $ZEPHYR_WOLFSSL_DIR"
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR
|
||||
|
||||
echo "Copy in Build files ..."
|
||||
cp -r * $ZEPHYR_WOLFSSL_DIR/
|
||||
rm $ZEPHYR_WOLFSSL_DIR/$0
|
||||
|
||||
echo "Copy Source Code ..."
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR/library
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR/library
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR/library/src
|
||||
mkdir -p $ZEPHYR_WOLFSSL_DIR/library/wolfcrypt/src
|
||||
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/src/*.c $ZEPHYR_WOLFSSL_DIR/library/src/
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/wolfcrypt/src/*.c $ZEPHYR_WOLFSSL_DIR/library/wolfcrypt/src/
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/wolfcrypt/src/*.i $ZEPHYR_WOLFSSL_DIR/library/wolfcrypt/src/
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/wolfcrypt/src/*.S $ZEPHYR_WOLFSSL_DIR/library/wolfcrypt/src/
|
||||
|
||||
echo "Copy Header Files ..."
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR/include
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR/include
|
||||
|
||||
cp $ZEPHYR_WOLFSSL_DIR/user_settings.h $ZEPHYR_WOLFSSL_DIR/include/
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/wolfssl $ZEPHYR_WOLFSSL_DIR/include/
|
||||
rm -f $ZEPHYR_WOLFSSL_DIR/include/wolfssl/options.h
|
||||
touch $ZEPHYR_WOLFSSL_DIR/include/wolfssl/options.h
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR/include/wolfssl/wolfcrypt/port
|
||||
|
||||
|
||||
echo "Done"
|
||||
|
147
IDE/zephyr/lib/settings/user_settings-tls-generic.h
Normal file
147
IDE/zephyr/lib/settings/user_settings-tls-generic.h
Normal file
@@ -0,0 +1,147 @@
|
||||
/* wolfssl options.h
|
||||
* generated from configure options
|
||||
*
|
||||
* Copyright (C) 2006-2015 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL. (formerly known as CyaSSL)
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef WOLFSSL_OPTIONS_H
|
||||
#define WOLFSSL_OPTIONS_H
|
||||
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#undef WOLFSSL_ZEPHYR
|
||||
#define WOLFSSL_ZEPHYR
|
||||
|
||||
#if 0
|
||||
#undef SINGLE_THREADED
|
||||
#define SINGLE_THREADED
|
||||
#endif
|
||||
|
||||
#undef TFM_TIMING_RESISTANT
|
||||
#define TFM_TIMING_RESISTANT
|
||||
|
||||
#undef ECC_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
|
||||
#undef WC_RSA_BLINDING
|
||||
#define WC_RSA_BLINDING
|
||||
|
||||
#undef HAVE_AESGCM
|
||||
#define HAVE_AESGCM
|
||||
|
||||
#undef WOLFSSL_SHA512
|
||||
#define WOLFSSL_SHA512
|
||||
|
||||
#undef WOLFSSL_SHA384
|
||||
#define WOLFSSL_SHA384
|
||||
|
||||
#undef NO_DSA
|
||||
#define NO_DSA
|
||||
|
||||
#undef HAVE_ECC
|
||||
#define HAVE_ECC
|
||||
|
||||
#undef TFM_ECC256
|
||||
#define TFM_ECC256
|
||||
|
||||
#undef WOLFSSL_BASE64_ENCODE
|
||||
#define WOLFSSL_BASE64_ENCODE
|
||||
|
||||
#undef NO_RC4
|
||||
#define NO_RC4
|
||||
|
||||
#undef NO_HC128
|
||||
#define NO_HC128
|
||||
|
||||
#undef NO_RABBIT
|
||||
#define NO_RABBIT
|
||||
|
||||
#undef WOLFSSL_SHA224
|
||||
#define WOLFSSL_SHA224
|
||||
|
||||
#undef WOLFSSL_SHA3
|
||||
#define WOLFSSL_SHA3
|
||||
|
||||
#undef HAVE_POLY1305
|
||||
#define HAVE_POLY1305
|
||||
|
||||
#undef HAVE_ONE_TIME_AUTH
|
||||
#define HAVE_ONE_TIME_AUTH
|
||||
|
||||
#undef HAVE_CHACHA
|
||||
#define HAVE_CHACHA
|
||||
|
||||
#undef HAVE_HASHDRBG
|
||||
#define HAVE_HASHDRBG
|
||||
|
||||
#undef NO_FILESYSTEM
|
||||
#define NO_FILESYSTEM
|
||||
|
||||
#undef HAVE_TLS_EXTENSIONS
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
|
||||
#undef HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
|
||||
#undef HAVE_EXTENDED_MASTER
|
||||
#define HAVE_EXTENDED_MASTER
|
||||
|
||||
#undef NO_PSK
|
||||
#define NO_PSK
|
||||
|
||||
#undef NO_MD4
|
||||
#define NO_MD4
|
||||
|
||||
#undef NO_PWDBASED
|
||||
#define NO_PWDBASED
|
||||
|
||||
#undef USE_FAST_MATH
|
||||
#define USE_FAST_MATH
|
||||
|
||||
#undef WOLFSSL_NO_ASM
|
||||
#define WOLFSSL_NO_ASM
|
||||
|
||||
#undef WOLFSSL_X86_BUILD
|
||||
#define WOLFSSL_X86_BUILD
|
||||
|
||||
#undef WC_NO_ASYNC_THREADING
|
||||
#define WC_NO_ASYNC_THREADING
|
||||
|
||||
#undef NO_DES3
|
||||
#define NO_DES3
|
||||
|
||||
#if 1
|
||||
#undef NO_ASN_TIME
|
||||
#define NO_ASN_TIME
|
||||
#endif
|
||||
|
||||
#undef WOLFSSL_STATIC_MEMORY
|
||||
#define WOLFSSL_STATIC_MEMORY
|
||||
|
||||
#if 0
|
||||
#undef WOLFSSL_HAVE_SP_RSA
|
||||
#define WOLFSSL_HAVE_SP_RSA
|
||||
#undef WOLFSSL_HAVE_SP_DH
|
||||
#define WOLFSSL_HAVE_SP_DH
|
||||
#undef WOLFSSL_HAVE_SP_ECC
|
||||
#define WOLFSSL_HAVE_SP_ECC
|
||||
#endif
|
||||
|
||||
#if 0
|
||||
#undef DEBUG_WOLFSSL
|
||||
#define DEBUG_WOLFSSL
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
#endif /* WOLFSSL_OPTIONS_H */
|
||||
|
147
IDE/zephyr/lib/user_settings.h
Normal file
147
IDE/zephyr/lib/user_settings.h
Normal file
@@ -0,0 +1,147 @@
|
||||
|
||||
#ifndef USER_SETTINGS_H
|
||||
#define USER_SETTINGS_H
|
||||
|
||||
#ifdef CONFIG_WOLFSSL
|
||||
#ifdef CONFIG_WOLFSSL_SETTINGS_FILE
|
||||
|
||||
#include CONFIG_WOLFSSL_SETTINGS_FILE
|
||||
|
||||
#else
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#undef WOLFSSL_ZEPHYR
|
||||
#define WOLFSSL_ZEPHYR
|
||||
|
||||
#if 0
|
||||
#undef SINGLE_THREADED
|
||||
#define SINGLE_THREADED
|
||||
#endif
|
||||
|
||||
#undef TFM_TIMING_RESISTANT
|
||||
#define TFM_TIMING_RESISTANT
|
||||
|
||||
#undef ECC_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
|
||||
#undef WC_RSA_BLINDING
|
||||
#define WC_RSA_BLINDING
|
||||
|
||||
#undef HAVE_AESGCM
|
||||
#define HAVE_AESGCM
|
||||
|
||||
#undef WOLFSSL_SHA512
|
||||
#define WOLFSSL_SHA512
|
||||
|
||||
#undef WOLFSSL_SHA384
|
||||
#define WOLFSSL_SHA384
|
||||
|
||||
#undef NO_DSA
|
||||
#define NO_DSA
|
||||
|
||||
#undef HAVE_ECC
|
||||
#define HAVE_ECC
|
||||
|
||||
#undef TFM_ECC256
|
||||
#define TFM_ECC256
|
||||
|
||||
#undef WOLFSSL_BASE64_ENCODE
|
||||
#define WOLFSSL_BASE64_ENCODE
|
||||
|
||||
#undef NO_RC4
|
||||
#define NO_RC4
|
||||
|
||||
#undef NO_HC128
|
||||
#define NO_HC128
|
||||
|
||||
#undef NO_RABBIT
|
||||
#define NO_RABBIT
|
||||
|
||||
#undef WOLFSSL_SHA224
|
||||
#define WOLFSSL_SHA224
|
||||
|
||||
#undef WOLFSSL_SHA3
|
||||
#define WOLFSSL_SHA3
|
||||
|
||||
#undef HAVE_POLY1305
|
||||
#define HAVE_POLY1305
|
||||
|
||||
#undef HAVE_ONE_TIME_AUTH
|
||||
#define HAVE_ONE_TIME_AUTH
|
||||
|
||||
#undef HAVE_CHACHA
|
||||
#define HAVE_CHACHA
|
||||
|
||||
#undef HAVE_HASHDRBG
|
||||
#define HAVE_HASHDRBG
|
||||
|
||||
#undef NO_FILESYSTEM
|
||||
#define NO_FILESYSTEM
|
||||
|
||||
#undef HAVE_TLS_EXTENSIONS
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
|
||||
#undef HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
|
||||
#undef HAVE_EXTENDED_MASTER
|
||||
#define HAVE_EXTENDED_MASTER
|
||||
|
||||
#undef NO_PSK
|
||||
#define NO_PSK
|
||||
|
||||
#undef NO_MD4
|
||||
#define NO_MD4
|
||||
|
||||
#undef NO_PWDBASED
|
||||
#define NO_PWDBASED
|
||||
|
||||
#undef USE_FAST_MATH
|
||||
#define USE_FAST_MATH
|
||||
|
||||
#undef WOLFSSL_NO_ASM
|
||||
#define WOLFSSL_NO_ASM
|
||||
|
||||
#undef WOLFSSL_X86_BUILD
|
||||
#define WOLFSSL_X86_BUILD
|
||||
|
||||
#undef WC_NO_ASYNC_THREADING
|
||||
#define WC_NO_ASYNC_THREADING
|
||||
|
||||
#undef NO_DES3
|
||||
#define NO_DES3
|
||||
|
||||
#if 1
|
||||
#undef NO_ASN_TIME
|
||||
#define NO_ASN_TIME
|
||||
#endif
|
||||
|
||||
#undef WOLFSSL_STATIC_MEMORY
|
||||
#define WOLFSSL_STATIC_MEMORY
|
||||
|
||||
#if 0
|
||||
#undef WOLFSSL_HAVE_SP_RSA
|
||||
#define WOLFSSL_HAVE_SP_RSA
|
||||
#undef WOLFSSL_HAVE_SP_DH
|
||||
#define WOLFSSL_HAVE_SP_DH
|
||||
#undef WOLFSSL_HAVE_SP_ECC
|
||||
#define WOLFSSL_HAVE_SP_ECC
|
||||
#endif
|
||||
|
||||
#if 0
|
||||
#undef DEBUG_WOLFSSL
|
||||
#define DEBUG_WOLFSSL
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif /* CONFIG_WOLFSSL_SETTINGS_FILE */
|
||||
#endif /* CONFIG_WOLFSSL */
|
||||
|
||||
#endif /* USER_SETTINGS_H */
|
||||
|
19
IDE/zephyr/lib/zephyr_init.c
Normal file
19
IDE/zephyr/lib/zephyr_init.c
Normal file
@@ -0,0 +1,19 @@
|
||||
/** @file
|
||||
* @brief wolfSSL initialization
|
||||
*
|
||||
* Initialize the wolfSSL library.
|
||||
*/
|
||||
|
||||
#include <init.h>
|
||||
|
||||
#include "user_settings.h"
|
||||
#include "wolfssl/ssl.h"
|
||||
|
||||
static int _wolfssl_init(struct device *device)
|
||||
{
|
||||
ARG_UNUSED(device);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
SYS_INIT(_wolfssl_init, POST_KERNEL, 0);
|
22
IDE/zephyr/setup.sh
Executable file
22
IDE/zephyr/setup.sh
Executable file
@@ -0,0 +1,22 @@
|
||||
#!/bin/sh
|
||||
|
||||
# Check for zephyr directory on command line
|
||||
if [ $# -ne 1 ]; then
|
||||
echo "Usage: $0 'zephyr project root directory path'" 1>&2
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_DIR=$1
|
||||
|
||||
# Check zephyr directory exists
|
||||
if [ ! -d $ZEPHR_DIR ]; then
|
||||
echo "Zephyr project directory does not exist: $ZEPHYR_DIR"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
cd `dirname $0`
|
||||
|
||||
(cd lib; ./install_lib.sh $ZEPHYR_DIR)
|
||||
(cd wolfssl_test; ./install_test.sh $ZEPHYR_DIR)
|
||||
(cd wolfssl_tls_sock; ./install_sample.sh $ZEPHYR_DIR)
|
||||
(cd wolfssl_tls_thread; ./install_sample.sh $ZEPHYR_DIR)
|
||||
|
8
IDE/zephyr/wolfssl_test/CMakeLists.txt
Normal file
8
IDE/zephyr/wolfssl_test/CMakeLists.txt
Normal file
@@ -0,0 +1,8 @@
|
||||
cmake_minimum_required(VERSION 3.13.1)
|
||||
include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE)
|
||||
project(wolfssl_test)
|
||||
|
||||
FILE(GLOB app_sources src/*.c)
|
||||
target_sources(app PRIVATE ${app_sources})
|
||||
add_definitions(-DWOLFSSL_USER_SETTINGS)
|
||||
|
12
IDE/zephyr/wolfssl_test/README
Normal file
12
IDE/zephyr/wolfssl_test/README
Normal file
@@ -0,0 +1,12 @@
|
||||
|
||||
wolfSSL (formerly known as CyaSSL) and wolfCrypt are either licensed for use
|
||||
under the GPLv2 or a standard commercial license. For our users who cannot use
|
||||
wolfSSL under GPLv2, a commercial license to wolfSSL and wolfCrypt is available.
|
||||
Please contact wolfSSL Inc. directly at:
|
||||
|
||||
Email: licensing@wolfssl.com
|
||||
Phone: +1 425 245-8247
|
||||
|
||||
More information can be found on the wolfSSL website at www.wolfssl.com.
|
||||
|
||||
|
49
IDE/zephyr/wolfssl_test/install_test.sh
Executable file
49
IDE/zephyr/wolfssl_test/install_test.sh
Executable file
@@ -0,0 +1,49 @@
|
||||
#!/bin/sh
|
||||
|
||||
WOLFSSL_SRC_DIR=../../..
|
||||
|
||||
if [ ! -d $WOLFSSL_SRC_DIR ]; then
|
||||
echo "Directory does not exist: $WOLFSSL_SRC_DIR"
|
||||
exit 1
|
||||
fi
|
||||
if [ ! -f $WOLFSSL_SRC_DIR/wolfcrypt/test/test.c ]; then
|
||||
echo "Missing source file: $WOLFSSL_SRC_DIR/wolfcrypt/test/test.h"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
ZEPHYR_DIR=
|
||||
if [ $# -ne 1 ]; then
|
||||
echo "Need location of zephyr project as a command line argument"
|
||||
exit 1
|
||||
else
|
||||
ZEPHYR_DIR=$1
|
||||
fi
|
||||
if [ ! -d $ZEPHR_DIR ]; then
|
||||
echo "Zephyr project directory does not exist: $ZEPHYR_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_CRYPTO_DIR=$ZEPHYR_DIR/zephyr/samples/crypto
|
||||
if [ ! -d $ZEPHYR_CRYPTO_DIR ]; then
|
||||
echo "Zephyr crypto directory does not exist: $ZEPHYR_CRYPTO_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_WOLFSSL_DIR=$ZEPHYR_CRYPTO_DIR/wolfssl_test
|
||||
|
||||
echo "wolfSSL directory:"
|
||||
echo " $ZEPHYR_WOLFSSL_DIR"
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR
|
||||
|
||||
echo "Copy in Build files ..."
|
||||
cp -r * $ZEPHYR_WOLFSSL_DIR/
|
||||
rm $ZEPHYR_WOLFSSL_DIR/$0
|
||||
|
||||
echo "Copy Source Code ..."
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR/src
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR/src
|
||||
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/wolfcrypt/test/test.c $ZEPHYR_WOLFSSL_DIR/src/
|
||||
cp -rf ${WOLFSSL_SRC_DIR}/wolfcrypt/test/test.h $ZEPHYR_WOLFSSL_DIR/src/
|
||||
|
||||
echo "Done"
|
||||
|
25
IDE/zephyr/wolfssl_test/prj.conf
Normal file
25
IDE/zephyr/wolfssl_test/prj.conf
Normal file
@@ -0,0 +1,25 @@
|
||||
# Kernel options
|
||||
CONFIG_MAIN_STACK_SIZE=32768
|
||||
CONFIG_ENTROPY_GENERATOR=y
|
||||
CONFIG_POSIX_API=y
|
||||
CONFIG_INIT_STACKS=y
|
||||
#CONFIG_FLOAT=y
|
||||
CONFIG_MINIMAL_LIBC_MALLOC_ARENA_SIZE=8192
|
||||
|
||||
# Networking
|
||||
CONFIG_NETWORKING=y
|
||||
CONFIG_NET_TEST=y
|
||||
CONFIG_NET_LOOPBACK=y
|
||||
CONFIG_NET_IPV4=y
|
||||
CONFIG_NET_IPV6=y
|
||||
CONFIG_NET_SOCKETS=y
|
||||
CONFIG_DNS_RESOLVER=y
|
||||
|
||||
# Logging
|
||||
CONFIG_PRINTK=y
|
||||
CONFIG_WOLFSSL_DEBUG=y
|
||||
|
||||
# TLS configuration
|
||||
CONFIG_WOLFSSL=y
|
||||
CONFIG_WOLFSSL_BUILTIN=y
|
||||
|
9
IDE/zephyr/wolfssl_test/sample.yaml
Normal file
9
IDE/zephyr/wolfssl_test/sample.yaml
Normal file
@@ -0,0 +1,9 @@
|
||||
common:
|
||||
harness: crypto
|
||||
tags: crypto
|
||||
sample:
|
||||
description: wolfSSL test application
|
||||
name: wolfSSL Test
|
||||
tests:
|
||||
test:
|
||||
platform_whitelist: qemu_x86
|
8
IDE/zephyr/wolfssl_tls_sock/CMakeLists.txt
Normal file
8
IDE/zephyr/wolfssl_tls_sock/CMakeLists.txt
Normal file
@@ -0,0 +1,8 @@
|
||||
cmake_minimum_required(VERSION 3.13.1)
|
||||
include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE)
|
||||
project(wolfssl_tls_threaded)
|
||||
|
||||
FILE(GLOB app_sources src/*.c)
|
||||
target_sources(app PRIVATE ${app_sources})
|
||||
add_definitions(-DWOLFSSL_USER_SETTINGS)
|
||||
|
12
IDE/zephyr/wolfssl_tls_sock/README
Normal file
12
IDE/zephyr/wolfssl_tls_sock/README
Normal file
@@ -0,0 +1,12 @@
|
||||
|
||||
wolfSSL (formerly known as CyaSSL) and wolfCrypt are either licensed for use
|
||||
under the GPLv2 or a standard commercial license. For our users who cannot use
|
||||
wolfSSL under GPLv2, a commercial license to wolfSSL and wolfCrypt is available.
|
||||
Please contact wolfSSL Inc. directly at:
|
||||
|
||||
Email: licensing@wolfssl.com
|
||||
Phone: +1 425 245-8247
|
||||
|
||||
More information can be found on the wolfSSL website at www.wolfssl.com.
|
||||
|
||||
|
31
IDE/zephyr/wolfssl_tls_sock/install_sample.sh
Executable file
31
IDE/zephyr/wolfssl_tls_sock/install_sample.sh
Executable file
@@ -0,0 +1,31 @@
|
||||
#!/bin/sh
|
||||
|
||||
ZEPHYR_DIR=
|
||||
if [ $# -ne 1 ]; then
|
||||
echo "Need location of zephyr project as a command line argument"
|
||||
exit 1
|
||||
else
|
||||
ZEPHYR_DIR=$1
|
||||
fi
|
||||
if [ ! -d $ZEPHR_DIR ]; then
|
||||
echo "Zephyr project directory does not exist: $ZEPHYR_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_CRYPTO_DIR=$ZEPHYR_DIR/zephyr/samples/crypto
|
||||
if [ ! -d $ZEPHYR_CRYPTO_DIR ]; then
|
||||
echo "Zephyr crypto directory does not exist: $ZEPHYR_CRYPTO_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_WOLFSSL_DIR=$ZEPHYR_CRYPTO_DIR/wolfssl_tls_sock
|
||||
|
||||
echo "wolfSSL directory:"
|
||||
echo " $ZEPHYR_WOLFSSL_DIR"
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR
|
||||
|
||||
echo "Copy in Sample files ..."
|
||||
cp -r * $ZEPHYR_WOLFSSL_DIR/
|
||||
rm $ZEPHYR_WOLFSSL_DIR/$0
|
||||
|
||||
echo "Done"
|
||||
|
53
IDE/zephyr/wolfssl_tls_sock/prj.conf
Normal file
53
IDE/zephyr/wolfssl_tls_sock/prj.conf
Normal file
@@ -0,0 +1,53 @@
|
||||
# Kernel options
|
||||
CONFIG_MAIN_STACK_SIZE=12288
|
||||
CONFIG_ENTROPY_GENERATOR=y
|
||||
CONFIG_POSIX_API=y
|
||||
CONFIG_INIT_STACKS=y
|
||||
CONFIG_MINIMAL_LIBC_MALLOC_ARENA_SIZE=8192
|
||||
|
||||
# General config
|
||||
CONFIG_NEWLIB_LIBC=y
|
||||
|
||||
# Networking config
|
||||
CONFIG_NETWORKING=y
|
||||
CONFIG_NET_IPV4=y
|
||||
CONFIG_NET_IPV6=n
|
||||
CONFIG_NET_TCP=y
|
||||
CONFIG_NET_SOCKETS=y
|
||||
CONFIG_NET_SOCKETS_POSIX_NAMES=y
|
||||
|
||||
CONFIG_NET_TEST=y
|
||||
CONFIG_NET_LOOPBACK=y
|
||||
CONFIG_DNS_RESOLVER=y
|
||||
CONFIG_DNS_SERVER_IP_ADDRESSES=y
|
||||
CONFIG_DNS_SERVER1="192.0.2.2"
|
||||
|
||||
# Network driver config
|
||||
CONFIG_TEST_RANDOM_GENERATOR=y
|
||||
|
||||
# Network address config
|
||||
CONFIG_NET_CONFIG_SETTINGS=y
|
||||
CONFIG_NET_CONFIG_NEED_IPV4=y
|
||||
CONFIG_NET_CONFIG_MY_IPV4_ADDR="192.0.2.1"
|
||||
CONFIG_NET_CONFIG_PEER_IPV4_ADDR="192.0.2.2"
|
||||
CONFIG_NET_CONFIG_MY_IPV4_GW="192.0.2.2"
|
||||
|
||||
CONFIG_NET_PKT_TX_COUNT=10
|
||||
|
||||
# Network debug config
|
||||
#CONFIG_NET_LOG=y
|
||||
#CONFIG_NET_PKT_LOG_LEVEL_DBG=y
|
||||
|
||||
# Logging
|
||||
CONFIG_PRINTK=y
|
||||
CONFIG_WOLFSSL_DEBUG=y
|
||||
|
||||
# TLS configuration
|
||||
CONFIG_WOLFSSL=y
|
||||
CONFIG_WOLFSSL_BUILTIN=y
|
||||
|
||||
CONFIG_WOLFSSL_TLS_VERSION_1_2=y
|
||||
CONFIG_WOLFSSL_KEY_EXCHANGE_ALL_ENABLED=y
|
||||
CONFIG_WOLFSSL_CIPHER_ALL_ENABLED=y
|
||||
CONFIG_WOLFSSL_MAC_ALL_ENABLED=y
|
||||
CONFIG_WOLFSSL_HMAC_DRBG_ENABLED=y
|
9
IDE/zephyr/wolfssl_tls_sock/sample.yaml
Normal file
9
IDE/zephyr/wolfssl_tls_sock/sample.yaml
Normal file
@@ -0,0 +1,9 @@
|
||||
common:
|
||||
harness: crypto
|
||||
tags: crypto
|
||||
sample:
|
||||
description: wolfSSL TLS test application
|
||||
name: wolfSSL TLS Test
|
||||
tests:
|
||||
test:
|
||||
platform_whitelist: qemu_x86
|
512
IDE/zephyr/wolfssl_tls_sock/src/tls_sock.c
Executable file
512
IDE/zephyr/wolfssl_tls_sock/src/tls_sock.c
Executable file
@@ -0,0 +1,512 @@
|
||||
/* tls_sock.c
|
||||
*
|
||||
* Copyright (C) 2006-2019 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL. (formerly known as CyaSSL)
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
||||
*/
|
||||
|
||||
#include <wolfssl/options.h>
|
||||
#include <wolfssl/ssl.h>
|
||||
#define USE_CERT_BUFFERS_2048
|
||||
#include <wolfssl/certs_test.h>
|
||||
#include <wolfssl/test.h>
|
||||
|
||||
#ifdef WOLFSSL_ZEPHYR
|
||||
#define printf printk
|
||||
#endif
|
||||
|
||||
#define BUFFER_SIZE 2048
|
||||
#define STATIC_MEM_SIZE (96*1024)
|
||||
#define THREAD_STACK_SIZE (12*1024)
|
||||
#define MAX_SEND_SIZE 256
|
||||
|
||||
/* The stack to use in the server's thread. */
|
||||
K_THREAD_STACK_DEFINE(server_stack, THREAD_STACK_SIZE);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
static WOLFSSL_HEAP_HINT* HEAP_HINT_SERVER;
|
||||
static WOLFSSL_HEAP_HINT* HEAP_HINT_CLIENT;
|
||||
|
||||
static byte gMemoryServer[STATIC_MEM_SIZE];
|
||||
static byte gMemoryClient[STATIC_MEM_SIZE];
|
||||
#else
|
||||
#define HEAP_HINT_SERVER NULL
|
||||
#define HEAP_HINT_CLIENT NULL
|
||||
#endif /* WOLFSSL_STATIC_MEMORY */
|
||||
|
||||
/* Application data to send. */
|
||||
static const char msgHTTPGet[] = "GET /index.html HTTP/1.0\r\n\r\n";
|
||||
static const char msgHTTPIndex[] =
|
||||
"HTTP/1.1 200 OK\n"
|
||||
"Content-Type: text/html\n"
|
||||
"Connection: close\n"
|
||||
"\n"
|
||||
"<html>\n"
|
||||
"<head>\n"
|
||||
"<title>Welcome to wolfSSL!</title>\n"
|
||||
"</head>\n"
|
||||
"<body>\n"
|
||||
"<p>wolfSSL has successfully performed handshake!</p>\n"
|
||||
"</body>\n"
|
||||
"</html>\n";
|
||||
|
||||
|
||||
/* Create a new wolfSSL client with a server CA certificate. */
|
||||
static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* client_ctx = NULL;
|
||||
WOLFSSL* client_ssl = NULL;
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((client_ctx = wolfSSL_CTX_new_ex(wolfTLSv1_2_client_method(),
|
||||
HEAP_HINT_CLIENT)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, ca_cert_der_2048,
|
||||
sizeof_ca_cert_der_2048, WOLFSSL_FILETYPE_ASN1) !=
|
||||
WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: failed to load CA certiifcate\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Create a WOLFSSL object */
|
||||
if ((client_ssl = wolfSSL_new(client_ctx)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL object\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* make wolfSSL object nonblocking */
|
||||
wolfSSL_set_using_nonblock(client_ssl, 1);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Return newly created wolfSSL context and object */
|
||||
*ctx = client_ctx;
|
||||
*ssl = client_ssl;
|
||||
}
|
||||
else {
|
||||
if (client_ssl != NULL)
|
||||
wolfSSL_free(client_ssl);
|
||||
if (client_ctx != NULL)
|
||||
wolfSSL_CTX_free(client_ctx);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Client connecting to server using TLS */
|
||||
static int wolfssl_client_connect(WOLFSSL* ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
|
||||
if (wolfSSL_connect(ssl) != WOLFSSL_SUCCESS) {
|
||||
printf("wolfSSL Error: %d\n", wolfSSL_get_error(ssl, -1));
|
||||
if (!wolfSSL_want_read(ssl) && !wolfSSL_want_write(ssl))
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Create a new wolfSSL server with a certificate for authentication. */
|
||||
static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* server_ctx = NULL;
|
||||
WOLFSSL* server_ssl = NULL;
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((server_ctx = wolfSSL_CTX_new_ex(wolfTLSv1_2_server_method(),
|
||||
HEAP_HINT_SERVER)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx,
|
||||
server_cert_der_2048, sizeof_server_cert_der_2048,
|
||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: failed to load server certiifcate\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_use_PrivateKey_buffer(server_ctx,
|
||||
server_key_der_2048, sizeof_server_key_der_2048,
|
||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: failed to load server key\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Create a WOLFSSL object */
|
||||
if ((server_ssl = wolfSSL_new(server_ctx)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL object\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* make wolfSSL object nonblocking */
|
||||
wolfSSL_set_using_nonblock(server_ssl, 1);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Return newly created wolfSSL context and object */
|
||||
*ctx = server_ctx;
|
||||
*ssl = server_ssl;
|
||||
}
|
||||
else {
|
||||
if (server_ssl != NULL)
|
||||
wolfSSL_free(server_ssl);
|
||||
if (server_ctx != NULL)
|
||||
wolfSSL_CTX_free(server_ctx);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Server accepting a client using TLS */
|
||||
static int wolfssl_server_accept(WOLFSSL* ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
|
||||
if (wolfSSL_accept(ssl) != WOLFSSL_SUCCESS) {
|
||||
printf("wolfSSL Error: %d\n", wolfSSL_get_error(ssl, -1));
|
||||
if (!wolfSSL_want_read(ssl) && !wolfSSL_want_write(ssl))
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
/* Send application data. */
|
||||
static int wolfssl_send(WOLFSSL* ssl, const char* msg)
|
||||
{
|
||||
int ret = 0;
|
||||
int len;
|
||||
|
||||
printf("Sending:\n%s\n", msg);
|
||||
len = wolfSSL_write(ssl, msg, XSTRLEN(msg));
|
||||
if (len < 0)
|
||||
ret = len;
|
||||
else if (len != XSTRLEN(msg))
|
||||
ret = -1;
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Receive application data. */
|
||||
static int wolfssl_recv(WOLFSSL* ssl)
|
||||
{
|
||||
int ret;
|
||||
byte reply[256];
|
||||
|
||||
ret = wolfSSL_read(ssl, reply, sizeof(reply)-1);
|
||||
if (ret > 0) {
|
||||
reply[ret] = '\0';
|
||||
printf("Received:\n%s\n", reply);
|
||||
ret = 1;
|
||||
}
|
||||
else if (wolfSSL_want_read(ssl) || wolfSSL_want_write(ssl))
|
||||
ret = 0;
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
/* Free the WOLFSSL object and context. */
|
||||
static void wolfssl_free(WOLFSSL_CTX* ctx, WOLFSSL* ssl)
|
||||
{
|
||||
if (ssl != NULL)
|
||||
wolfSSL_free(ssl);
|
||||
if (ctx != NULL)
|
||||
wolfSSL_CTX_free(ctx);
|
||||
}
|
||||
|
||||
|
||||
/* Display the static memory usage. */
|
||||
static void wolfssl_memstats(WOLFSSL* ssl)
|
||||
{
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
WOLFSSL_MEM_CONN_STATS ssl_stats;
|
||||
|
||||
XMEMSET(&ssl_stats, 0 , sizeof(ssl_stats));
|
||||
|
||||
if (wolfSSL_is_static_memory(ssl, &ssl_stats) != 1)
|
||||
printf("static memory was not used with ssl");
|
||||
else {
|
||||
printf("*** This is memory state before wolfSSL_free is called\n");
|
||||
printf("peak connection memory = %d\n", ssl_stats.peakMem);
|
||||
printf("current memory in use = %d\n", ssl_stats.curMem);
|
||||
printf("peak connection allocs = %d\n", ssl_stats.peakAlloc);
|
||||
printf("current connection allocs = %d\n",ssl_stats.curAlloc);
|
||||
printf("total connection allocs = %d\n",ssl_stats.totalAlloc);
|
||||
printf("total connection frees = %d\n\n", ssl_stats.totalFr);
|
||||
}
|
||||
#else
|
||||
(void)ssl;
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
/* Start the server thread. */
|
||||
void start_thread(THREAD_FUNC func, func_args* args, THREAD_TYPE* thread)
|
||||
{
|
||||
k_thread_create(thread, server_stack, K_THREAD_STACK_SIZEOF(server_stack),
|
||||
func, args, NULL, NULL, 5, 0, K_NO_WAIT);
|
||||
}
|
||||
|
||||
void join_thread(THREAD_TYPE thread)
|
||||
{
|
||||
/* Threads are handled in the kernel. */
|
||||
}
|
||||
|
||||
|
||||
int wolfssl_server_accept_tcp(WOLFSSL* ssl, SOCKET_T* fd, SOCKET_T* acceptfd)
|
||||
{
|
||||
int ret = 0;
|
||||
SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID;
|
||||
SOCKET_T clientfd = WOLFSSL_SOCKET_INVALID;
|
||||
SOCKADDR_IN_T client;
|
||||
socklen_t client_len = sizeof(client);
|
||||
word16 port = 443;
|
||||
struct sockaddr_in bind_addr;
|
||||
|
||||
if (ret == 0) {
|
||||
sockfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
||||
bind_addr.sin_family = AF_INET;
|
||||
bind_addr.sin_addr.s_addr = htonl(INADDR_ANY);
|
||||
bind_addr.sin_port = htons(port);
|
||||
if (bind(sockfd, (struct sockaddr *)&bind_addr, sizeof(bind_addr)) != 0)
|
||||
ret = -1;
|
||||
}
|
||||
if (ret == 0) {
|
||||
*fd = sockfd;
|
||||
printf("Server Listen\n");
|
||||
listen(sockfd, 5);
|
||||
if (WOLFSSL_SOCKET_IS_INVALID(sockfd))
|
||||
ret = -1;
|
||||
}
|
||||
if (ret == 0) {
|
||||
printf("Server Accept\n");
|
||||
clientfd = accept(sockfd, (struct sockaddr*)&client,
|
||||
(ACCEPT_THIRD_T)&client_len);
|
||||
if (WOLFSSL_SOCKET_IS_INVALID(clientfd))
|
||||
ret = -1;
|
||||
}
|
||||
if (ret == 0) {
|
||||
*acceptfd = clientfd;
|
||||
tcp_set_nonblocking(&clientfd);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
printf("Server has client\n");
|
||||
if (wolfSSL_set_fd(ssl, clientfd) != WOLFSSL_SUCCESS)
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Thread to do the server operations. */
|
||||
void server_thread(void* arg1, void* arg2, void* arg3)
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* server_ctx = NULL;
|
||||
WOLFSSL* server_ssl = NULL;
|
||||
SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID;
|
||||
SOCKET_T clientfd = WOLFSSL_SOCKET_INVALID;
|
||||
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
if (wc_LoadStaticMemory(&HEAP_HINT_SERVER, gMemoryServer,
|
||||
sizeof(gMemoryServer),
|
||||
WOLFMEM_GENERAL | WOLFMEM_TRACK_STATS, 1) != 0) {
|
||||
printf("unable to load static memory");
|
||||
ret = -1;
|
||||
}
|
||||
#endif
|
||||
|
||||
if (ret == 0)
|
||||
ret = wolfssl_server_new(&server_ctx, &server_ssl);
|
||||
|
||||
if (ret == 0)
|
||||
ret = wolfssl_server_accept_tcp(server_ssl, &sockfd, &clientfd);
|
||||
|
||||
while (ret == 0) {
|
||||
k_sleep(100);
|
||||
ret = wolfssl_server_accept(server_ssl);
|
||||
if (ret == 0 && wolfSSL_is_init_finished(server_ssl))
|
||||
break;
|
||||
}
|
||||
|
||||
/* Receive HTTP request */
|
||||
while (ret == 0) {
|
||||
ret = wolfssl_recv(server_ssl);
|
||||
}
|
||||
if (ret == 1)
|
||||
ret = 0;
|
||||
/* Send HTTP repsonse */
|
||||
if (ret == 0)
|
||||
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
||||
|
||||
printf("Server Return: %d\n", ret);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
printf("Server Memory Stats\n");
|
||||
#endif
|
||||
wolfssl_memstats(server_ssl);
|
||||
wolfssl_free(server_ctx, server_ssl);
|
||||
if (clientfd != WOLFSSL_SOCKET_INVALID)
|
||||
CloseSocket(clientfd);
|
||||
if (sockfd != WOLFSSL_SOCKET_INVALID)
|
||||
CloseSocket(sockfd);
|
||||
}
|
||||
|
||||
int wolfssl_client_connect_tcp(WOLFSSL* ssl, SOCKET_T* fd)
|
||||
{
|
||||
int ret = 0;
|
||||
SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID;
|
||||
static struct addrinfo hints;
|
||||
struct addrinfo* res;
|
||||
|
||||
XMEMSET(&hints, 0, sizeof(hints));
|
||||
hints.ai_family = AF_INET;
|
||||
hints.ai_socktype = SOCK_STREAM;
|
||||
if (getaddrinfo("192.0.2.1", "443", &hints, &res) != 0)
|
||||
ret = -1;
|
||||
|
||||
if (ret == 0) {
|
||||
printf("Client socket\n");
|
||||
sockfd = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
|
||||
if (WOLFSSL_SOCKET_IS_INVALID(sockfd))
|
||||
ret = -1;
|
||||
}
|
||||
if (ret == 0) {
|
||||
*fd = sockfd;
|
||||
tcp_set_nonblocking(&sockfd);
|
||||
}
|
||||
if (ret == 0) {
|
||||
printf("Client Connect\n");
|
||||
if (connect(sockfd, res->ai_addr, res->ai_addrlen) != 0)
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
printf("Client Connected\n");
|
||||
if (wolfSSL_set_fd(ssl, sockfd) != WOLFSSL_SUCCESS)
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Thread to do the client operations. */
|
||||
void client_thread()
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* client_ctx = NULL;
|
||||
WOLFSSL* client_ssl = NULL;
|
||||
SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID;
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
if (wc_LoadStaticMemory(&HEAP_HINT_CLIENT, gMemoryClient,
|
||||
sizeof(gMemoryClient),
|
||||
WOLFMEM_GENERAL | WOLFMEM_TRACK_STATS, 1) != 0) {
|
||||
printf("unable to load static memory");
|
||||
ret = -1;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Client connection */
|
||||
if (ret == 0)
|
||||
ret = wolfssl_client_new(&client_ctx, &client_ssl);
|
||||
|
||||
if (ret == 0)
|
||||
ret = wolfssl_client_connect_tcp(client_ssl, &sockfd);
|
||||
|
||||
while (ret == 0) {
|
||||
k_sleep(10);
|
||||
ret = wolfssl_client_connect(client_ssl);
|
||||
if (ret == 0 && wolfSSL_is_init_finished(client_ssl))
|
||||
break;
|
||||
}
|
||||
|
||||
if (ret == 0)
|
||||
printf("Handshake complete\n");
|
||||
|
||||
/* Send HTTP request */
|
||||
if (ret == 0)
|
||||
ret = wolfssl_send(client_ssl, msgHTTPGet);
|
||||
/* Receive HTTP response */
|
||||
while (ret == 0) {
|
||||
k_sleep(10);
|
||||
ret = wolfssl_recv(client_ssl);
|
||||
}
|
||||
if (ret == 1)
|
||||
ret = 0;
|
||||
|
||||
printf("Client Return: %d\n", ret);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
printf("Client Memory Stats\n");
|
||||
#endif
|
||||
wolfssl_memstats(client_ssl);
|
||||
wolfssl_free(client_ctx, client_ssl);
|
||||
if (sockfd != WOLFSSL_SOCKET_INVALID)
|
||||
CloseSocket(sockfd);
|
||||
}
|
||||
|
||||
int main()
|
||||
{
|
||||
int ret = 0;
|
||||
THREAD_TYPE serverThread;
|
||||
|
||||
wolfSSL_Init();
|
||||
|
||||
/* Start server */
|
||||
start_thread(server_thread, NULL, &serverThread);
|
||||
|
||||
k_sleep(100);
|
||||
client_thread();
|
||||
|
||||
join_thread(serverThread);
|
||||
|
||||
wolfSSL_Cleanup();
|
||||
|
||||
printf("Done\n");
|
||||
|
||||
return (ret == 0) ? 0 : 1;
|
||||
}
|
||||
|
8
IDE/zephyr/wolfssl_tls_thread/CMakeLists.txt
Normal file
8
IDE/zephyr/wolfssl_tls_thread/CMakeLists.txt
Normal file
@@ -0,0 +1,8 @@
|
||||
cmake_minimum_required(VERSION 3.13.1)
|
||||
include($ENV{ZEPHYR_BASE}/cmake/app/boilerplate.cmake NO_POLICY_SCOPE)
|
||||
project(wolfssl_tls_threaded)
|
||||
|
||||
FILE(GLOB app_sources src/*.c)
|
||||
target_sources(app PRIVATE ${app_sources})
|
||||
add_definitions(-DWOLFSSL_USER_SETTINGS)
|
||||
|
12
IDE/zephyr/wolfssl_tls_thread/README
Normal file
12
IDE/zephyr/wolfssl_tls_thread/README
Normal file
@@ -0,0 +1,12 @@
|
||||
|
||||
wolfSSL (formerly known as CyaSSL) and wolfCrypt are either licensed for use
|
||||
under the GPLv2 or a standard commercial license. For our users who cannot use
|
||||
wolfSSL under GPLv2, a commercial license to wolfSSL and wolfCrypt is available.
|
||||
Please contact wolfSSL Inc. directly at:
|
||||
|
||||
Email: licensing@wolfssl.com
|
||||
Phone: +1 425 245-8247
|
||||
|
||||
More information can be found on the wolfSSL website at www.wolfssl.com.
|
||||
|
||||
|
31
IDE/zephyr/wolfssl_tls_thread/install_sample.sh
Executable file
31
IDE/zephyr/wolfssl_tls_thread/install_sample.sh
Executable file
@@ -0,0 +1,31 @@
|
||||
#!/bin/sh
|
||||
|
||||
ZEPHYR_DIR=
|
||||
if [ $# -ne 1 ]; then
|
||||
echo "Need location of zephyr project as a command line argument"
|
||||
exit 1
|
||||
else
|
||||
ZEPHYR_DIR=$1
|
||||
fi
|
||||
if [ ! -d $ZEPHR_DIR ]; then
|
||||
echo "Zephyr project directory does not exist: $ZEPHYR_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_CRYPTO_DIR=$ZEPHYR_DIR/zephyr/samples/crypto
|
||||
if [ ! -d $ZEPHYR_CRYPTO_DIR ]; then
|
||||
echo "Zephyr crypto directory does not exist: $ZEPHYR_CRYPTO_DIR"
|
||||
exit 1
|
||||
fi
|
||||
ZEPHYR_WOLFSSL_DIR=$ZEPHYR_CRYPTO_DIR/wolfssl_tls_thread
|
||||
|
||||
echo "wolfSSL directory:"
|
||||
echo " $ZEPHYR_WOLFSSL_DIR"
|
||||
rm -rf $ZEPHYR_WOLFSSL_DIR
|
||||
mkdir $ZEPHYR_WOLFSSL_DIR
|
||||
|
||||
echo "Copy in Sample files ..."
|
||||
cp -r * $ZEPHYR_WOLFSSL_DIR/
|
||||
rm $ZEPHYR_WOLFSSL_DIR/$0
|
||||
|
||||
echo "Done"
|
||||
|
29
IDE/zephyr/wolfssl_tls_thread/prj.conf
Normal file
29
IDE/zephyr/wolfssl_tls_thread/prj.conf
Normal file
@@ -0,0 +1,29 @@
|
||||
# Kernel options
|
||||
CONFIG_MAIN_STACK_SIZE=12288
|
||||
CONFIG_ENTROPY_GENERATOR=y
|
||||
CONFIG_POSIX_API=y
|
||||
CONFIG_INIT_STACKS=y
|
||||
CONFIG_MINIMAL_LIBC_MALLOC_ARENA_SIZE=8192
|
||||
|
||||
# Networking
|
||||
CONFIG_NETWORKING=y
|
||||
CONFIG_NET_TEST=y
|
||||
CONFIG_NET_LOOPBACK=y
|
||||
CONFIG_NET_IPV4=y
|
||||
CONFIG_NET_IPV6=y
|
||||
CONFIG_NET_SOCKETS=y
|
||||
CONFIG_DNS_RESOLVER=y
|
||||
|
||||
# Logging
|
||||
CONFIG_PRINTK=y
|
||||
CONFIG_WOLFSSL_DEBUG=y
|
||||
|
||||
# TLS configuration
|
||||
CONFIG_WOLFSSL=y
|
||||
CONFIG_WOLFSSL_BUILTIN=y
|
||||
|
||||
CONFIG_WOLFSSL_TLS_VERSION_1_2=y
|
||||
CONFIG_WOLFSSL_KEY_EXCHANGE_ALL_ENABLED=y
|
||||
CONFIG_WOLFSSL_CIPHER_ALL_ENABLED=y
|
||||
CONFIG_WOLFSSL_MAC_ALL_ENABLED=y
|
||||
CONFIG_WOLFSSL_HMAC_DRBG_ENABLED=y
|
9
IDE/zephyr/wolfssl_tls_thread/sample.yaml
Normal file
9
IDE/zephyr/wolfssl_tls_thread/sample.yaml
Normal file
@@ -0,0 +1,9 @@
|
||||
common:
|
||||
harness: crypto
|
||||
tags: crypto
|
||||
sample:
|
||||
description: wolfSSL TLS test application
|
||||
name: wolfSSL TLS Test
|
||||
tests:
|
||||
test:
|
||||
platform_whitelist: qemu_x86
|
504
IDE/zephyr/wolfssl_tls_thread/src/tls_threaded.c
Executable file
504
IDE/zephyr/wolfssl_tls_thread/src/tls_threaded.c
Executable file
@@ -0,0 +1,504 @@
|
||||
/* tls_threaded.c
|
||||
*
|
||||
* Copyright (C) 2006-2019 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL. (formerly known as CyaSSL)
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
||||
*/
|
||||
|
||||
#include <wolfssl/options.h>
|
||||
#include <wolfssl/ssl.h>
|
||||
#define USE_CERT_BUFFERS_2048
|
||||
#include <wolfssl/certs_test.h>
|
||||
#include <wolfssl/test.h>
|
||||
|
||||
#ifdef WOLFSSL_ZEPHYR
|
||||
#define printf printk
|
||||
#endif
|
||||
|
||||
#define BUFFER_SIZE 2048
|
||||
#define STATIC_MEM_SIZE (96*1024)
|
||||
#define THREAD_STACK_SIZE (12*1024)
|
||||
|
||||
/* The stack to use in the server's thread. */
|
||||
K_THREAD_STACK_DEFINE(server_stack, THREAD_STACK_SIZE);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
static WOLFSSL_HEAP_HINT* HEAP_HINT_SERVER;
|
||||
static WOLFSSL_HEAP_HINT* HEAP_HINT_CLIENT;
|
||||
|
||||
static byte gMemoryServer[STATIC_MEM_SIZE];
|
||||
static byte gMemoryClient[STATIC_MEM_SIZE];
|
||||
#else
|
||||
#define HEAP_HINT_SERVER NULL
|
||||
#define HEAP_HINT_CLIENT NULL
|
||||
#endif /* WOLFSSL_STATIC_MEMORY */
|
||||
|
||||
/* Buffer to hold data for client to read. */
|
||||
unsigned char client_buffer[BUFFER_SIZE];
|
||||
int client_buffer_sz = 0;
|
||||
wolfSSL_Mutex client_mutex;
|
||||
|
||||
/* Buffer to hold data for server to read. */
|
||||
unsigned char server_buffer[BUFFER_SIZE];
|
||||
int server_buffer_sz = 0;
|
||||
wolfSSL_Mutex server_mutex;
|
||||
|
||||
/* Application data to send. */
|
||||
static const char msgHTTPGet[] = "GET /index.html HTTP/1.0\r\n\r\n";
|
||||
static const char msgHTTPIndex[] =
|
||||
"HTTP/1.1 200 OK\n"
|
||||
"Content-Type: text/html\n"
|
||||
"Connection: close\n"
|
||||
"\n"
|
||||
"<html>\n"
|
||||
"<head>\n"
|
||||
"<title>Welcome to wolfSSL!</title>\n"
|
||||
"</head>\n"
|
||||
"<body>\n"
|
||||
"<p>wolfSSL has successfully performed handshake!</p>\n"
|
||||
"</body>\n"
|
||||
"</html>\n";
|
||||
|
||||
/* wolfSSL client wants to read data from the server. */
|
||||
static int recv_client(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
wc_LockMutex(&client_mutex);
|
||||
if (client_buffer_sz > 0) {
|
||||
/* Take as many bytes is available or requested from buffer. */
|
||||
if (sz > client_buffer_sz)
|
||||
sz = client_buffer_sz;
|
||||
XMEMCPY(buff, client_buffer, sz);
|
||||
if (sz < client_buffer_sz) {
|
||||
XMEMMOVE(client_buffer, client_buffer + sz, client_buffer_sz - sz);
|
||||
}
|
||||
client_buffer_sz -= sz;
|
||||
}
|
||||
else
|
||||
sz = WOLFSSL_CBIO_ERR_WANT_READ;
|
||||
wc_UnLockMutex(&client_mutex);
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
/* wolfSSL client wants to write data to the server. */
|
||||
static int send_client(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
wc_LockMutex(&server_mutex);
|
||||
if (server_buffer_sz < BUFFER_SIZE)
|
||||
{
|
||||
/* Put in as many bytes requested or will fit in buffer. */
|
||||
if (sz > BUFFER_SIZE - server_buffer_sz)
|
||||
sz = BUFFER_SIZE - server_buffer_sz;
|
||||
XMEMCPY(server_buffer + server_buffer_sz, buff, sz);
|
||||
server_buffer_sz += sz;
|
||||
}
|
||||
else
|
||||
sz = WOLFSSL_CBIO_ERR_WANT_WRITE;
|
||||
wc_UnLockMutex(&server_mutex);
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
/* wolfSSL server wants to read data from the client. */
|
||||
static int recv_server(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
wc_LockMutex(&server_mutex);
|
||||
if (server_buffer_sz > 0) {
|
||||
/* Take as many bytes is available or requested from buffer. */
|
||||
if (sz > server_buffer_sz)
|
||||
sz = server_buffer_sz;
|
||||
XMEMCPY(buff, server_buffer, sz);
|
||||
if (sz < server_buffer_sz) {
|
||||
XMEMMOVE(server_buffer, server_buffer + sz, server_buffer_sz - sz);
|
||||
}
|
||||
server_buffer_sz -= sz;
|
||||
}
|
||||
else
|
||||
sz = WOLFSSL_CBIO_ERR_WANT_READ;
|
||||
wc_UnLockMutex(&server_mutex);
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
/* wolfSSL server wants to write data to the client. */
|
||||
static int send_server(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
wc_LockMutex(&client_mutex);
|
||||
if (client_buffer_sz < BUFFER_SIZE)
|
||||
{
|
||||
/* Put in as many bytes requested or will fit in buffer. */
|
||||
if (sz > BUFFER_SIZE - client_buffer_sz)
|
||||
sz = BUFFER_SIZE - client_buffer_sz;
|
||||
XMEMCPY(client_buffer + client_buffer_sz, buff, sz);
|
||||
client_buffer_sz += sz;
|
||||
}
|
||||
else
|
||||
sz = WOLFSSL_CBIO_ERR_WANT_WRITE;
|
||||
wc_UnLockMutex(&client_mutex);
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
/* Create a new wolfSSL client with a server CA certificate. */
|
||||
static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* client_ctx = NULL;
|
||||
WOLFSSL* client_ssl = NULL;
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((client_ctx = wolfSSL_CTX_new_ex(wolfTLSv1_2_client_method(),
|
||||
HEAP_HINT_CLIENT)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, ca_cert_der_2048,
|
||||
sizeof_ca_cert_der_2048, WOLFSSL_FILETYPE_ASN1) !=
|
||||
WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: failed to load CA certiifcate\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Register callbacks */
|
||||
wolfSSL_SetIORecv(client_ctx, recv_client);
|
||||
wolfSSL_SetIOSend(client_ctx, send_client);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Create a WOLFSSL object */
|
||||
if ((client_ssl = wolfSSL_new(client_ctx)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL object\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* make wolfSSL object nonblocking */
|
||||
wolfSSL_set_using_nonblock(client_ssl, 1);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Return newly created wolfSSL context and object */
|
||||
*ctx = client_ctx;
|
||||
*ssl = client_ssl;
|
||||
}
|
||||
else {
|
||||
if (client_ssl != NULL)
|
||||
wolfSSL_free(client_ssl);
|
||||
if (client_ctx != NULL)
|
||||
wolfSSL_CTX_free(client_ctx);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Client connecting to server using TLS */
|
||||
static int wolfssl_client_connect(WOLFSSL* ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
|
||||
if (wolfSSL_connect(ssl) != WOLFSSL_SUCCESS) {
|
||||
if (!wolfSSL_want_read(ssl) && !wolfSSL_want_write(ssl))
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* Create a new wolfSSL server with a certificate for authentication. */
|
||||
static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* server_ctx = NULL;
|
||||
WOLFSSL* server_ssl = NULL;
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((server_ctx = wolfSSL_CTX_new_ex(wolfTLSv1_2_server_method(),
|
||||
HEAP_HINT_SERVER)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx,
|
||||
server_cert_der_2048, sizeof_server_cert_der_2048,
|
||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: failed to load server certiifcate\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Load client certificates into WOLFSSL_CTX */
|
||||
if (wolfSSL_CTX_use_PrivateKey_buffer(server_ctx,
|
||||
server_key_der_2048, sizeof_server_key_der_2048,
|
||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: failed to load server key\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Register callbacks */
|
||||
wolfSSL_SetIORecv(server_ctx, recv_server);
|
||||
wolfSSL_SetIOSend(server_ctx, send_server);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Create a WOLFSSL object */
|
||||
if ((server_ssl = wolfSSL_new(server_ctx)) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL object\n");
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* make wolfSSL object nonblocking */
|
||||
wolfSSL_set_using_nonblock(server_ssl, 1);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* Return newly created wolfSSL context and object */
|
||||
*ctx = server_ctx;
|
||||
*ssl = server_ssl;
|
||||
}
|
||||
else {
|
||||
if (server_ssl != NULL)
|
||||
wolfSSL_free(server_ssl);
|
||||
if (server_ctx != NULL)
|
||||
wolfSSL_CTX_free(server_ctx);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Server accepting a client using TLS */
|
||||
static int wolfssl_server_accept(WOLFSSL* ssl)
|
||||
{
|
||||
int ret = 0;
|
||||
|
||||
if (wolfSSL_accept(ssl) != WOLFSSL_SUCCESS) {
|
||||
if (!wolfSSL_want_read(ssl) && !wolfSSL_want_write(ssl))
|
||||
ret = -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
/* Send application data. */
|
||||
static int wolfssl_send(WOLFSSL* ssl, const char* msg)
|
||||
{
|
||||
int ret = 0;
|
||||
int len;
|
||||
|
||||
printf("Sending:\n%s\n", msg);
|
||||
len = wolfSSL_write(ssl, msg, XSTRLEN(msg));
|
||||
if (len < 0)
|
||||
ret = len;
|
||||
else if (len != XSTRLEN(msg))
|
||||
ret = -1;
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* Receive application data. */
|
||||
static int wolfssl_recv(WOLFSSL* ssl)
|
||||
{
|
||||
int ret;
|
||||
byte reply[256];
|
||||
|
||||
ret = wolfSSL_read(ssl, reply, sizeof(reply)-1);
|
||||
if (ret > 0) {
|
||||
reply[ret] = '\0';
|
||||
printf("Received:\n%s\n", reply);
|
||||
ret = 1;
|
||||
}
|
||||
else if (wolfSSL_want_read(ssl) || wolfSSL_want_write(ssl))
|
||||
ret = 0;
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
/* Free the WOLFSSL object and context. */
|
||||
static void wolfssl_free(WOLFSSL_CTX* ctx, WOLFSSL* ssl)
|
||||
{
|
||||
if (ssl != NULL)
|
||||
wolfSSL_free(ssl);
|
||||
if (ctx != NULL)
|
||||
wolfSSL_CTX_free(ctx);
|
||||
}
|
||||
|
||||
|
||||
/* Display the static memory usage. */
|
||||
static void wolfssl_memstats(WOLFSSL* ssl)
|
||||
{
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
WOLFSSL_MEM_CONN_STATS ssl_stats;
|
||||
|
||||
XMEMSET(&ssl_stats, 0 , sizeof(ssl_stats));
|
||||
|
||||
if (wolfSSL_is_static_memory(ssl, &ssl_stats) != 1)
|
||||
printf("static memory was not used with ssl");
|
||||
else {
|
||||
printf("*** This is memory state before wolfSSL_free is called\n");
|
||||
printf("peak connection memory = %d\n", ssl_stats.peakMem);
|
||||
printf("current memory in use = %d\n", ssl_stats.curMem);
|
||||
printf("peak connection allocs = %d\n", ssl_stats.peakAlloc);
|
||||
printf("current connection allocs = %d\n",ssl_stats.curAlloc);
|
||||
printf("total connection allocs = %d\n",ssl_stats.totalAlloc);
|
||||
printf("total connection frees = %d\n\n", ssl_stats.totalFr);
|
||||
}
|
||||
#else
|
||||
(void)ssl;
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
/* Start the server thread. */
|
||||
void start_thread(THREAD_FUNC func, func_args* args, THREAD_TYPE* thread)
|
||||
{
|
||||
k_thread_create(thread, server_stack, K_THREAD_STACK_SIZEOF(server_stack),
|
||||
func, args, NULL, NULL, 5, 0, K_NO_WAIT);
|
||||
}
|
||||
|
||||
void join_thread(THREAD_TYPE thread)
|
||||
{
|
||||
/* Threads are handled in the kernel. */
|
||||
}
|
||||
|
||||
|
||||
/* Thread to do the server operations. */
|
||||
void server_thread(void* arg1, void* arg2, void* arg3)
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* server_ctx = NULL;
|
||||
WOLFSSL* server_ssl = NULL;
|
||||
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
if (wc_LoadStaticMemory(&HEAP_HINT_SERVER, gMemoryServer,
|
||||
sizeof(gMemoryServer),
|
||||
WOLFMEM_GENERAL | WOLFMEM_TRACK_STATS, 1) != 0) {
|
||||
printf("unable to load static memory");
|
||||
ret = -1;
|
||||
}
|
||||
#endif
|
||||
|
||||
if (ret == 0)
|
||||
ret = wolfssl_server_new(&server_ctx, &server_ssl);
|
||||
|
||||
while (ret == 0) {
|
||||
ret = wolfssl_server_accept(server_ssl);
|
||||
if (ret == 0 && wolfSSL_is_init_finished(server_ssl))
|
||||
break;
|
||||
}
|
||||
|
||||
/* Receive HTTP request */
|
||||
while (ret == 0) {
|
||||
ret = wolfssl_recv(server_ssl);
|
||||
}
|
||||
if (ret == 1)
|
||||
ret = 0;
|
||||
/* Send HTTP repsonse */
|
||||
if (ret == 0)
|
||||
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
||||
|
||||
printf("Server Return: %d\n", ret);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
printf("Server Memory Stats\n");
|
||||
#endif
|
||||
wolfssl_memstats(server_ssl);
|
||||
wolfssl_free(server_ctx, server_ssl);
|
||||
}
|
||||
|
||||
int main()
|
||||
{
|
||||
int ret = 0;
|
||||
WOLFSSL_CTX* client_ctx = NULL;
|
||||
WOLFSSL* client_ssl = NULL;
|
||||
THREAD_TYPE serverThread;
|
||||
|
||||
wolfSSL_Init();
|
||||
|
||||
wc_InitMutex(&client_mutex);
|
||||
wc_InitMutex(&server_mutex);
|
||||
|
||||
/* Start server */
|
||||
start_thread(server_thread, NULL, &serverThread);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
if (wc_LoadStaticMemory(&HEAP_HINT_CLIENT, gMemoryClient,
|
||||
sizeof(gMemoryClient),
|
||||
WOLFMEM_GENERAL | WOLFMEM_TRACK_STATS, 1) != 0) {
|
||||
printf("unable to load static memory");
|
||||
ret = -1;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Client connection */
|
||||
if (ret == 0)
|
||||
ret = wolfssl_client_new(&client_ctx, &client_ssl);
|
||||
|
||||
while (ret == 0) {
|
||||
ret = wolfssl_client_connect(client_ssl);
|
||||
if (ret == 0 && wolfSSL_is_init_finished(client_ssl))
|
||||
break;
|
||||
k_sleep(10);
|
||||
}
|
||||
|
||||
if (ret == 0)
|
||||
printf("Handshake complete\n");
|
||||
|
||||
/* Send HTTP request */
|
||||
if (ret == 0)
|
||||
ret = wolfssl_send(client_ssl, msgHTTPGet);
|
||||
/* Receive HTTP response */
|
||||
while (ret == 0) {
|
||||
k_sleep(10);
|
||||
ret = wolfssl_recv(client_ssl);
|
||||
}
|
||||
if (ret == 1)
|
||||
ret = 0;
|
||||
|
||||
printf("Client Return: %d\n", ret);
|
||||
|
||||
join_thread(serverThread);
|
||||
|
||||
#ifdef WOLFSSL_STATIC_MEMORY
|
||||
printf("Client Memory Stats\n");
|
||||
#endif
|
||||
wolfssl_memstats(client_ssl);
|
||||
wolfssl_free(client_ctx, client_ssl);
|
||||
|
||||
wolfSSL_Cleanup();
|
||||
|
||||
printf("Done\n");
|
||||
|
||||
return (ret == 0) ? 0 : 1;
|
||||
}
|
||||
|
@@ -6436,6 +6436,13 @@ ProtocolVersion MakeDTLSv1_2(void)
|
||||
return now;
|
||||
}
|
||||
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
|
||||
word32 LowResTimer(void)
|
||||
{
|
||||
return k_uptime_get() / 1000;
|
||||
}
|
||||
|
||||
#else
|
||||
/* Posix style time */
|
||||
#ifndef USER_TIME
|
||||
|
@@ -238,6 +238,11 @@ int EmbedSend(WOLFSSL* ssl, char *buf, int sz, void *ctx)
|
||||
int sd = *(int*)ctx;
|
||||
int sent;
|
||||
|
||||
#ifdef WOLFSSL_MAX_SEND_SZ
|
||||
if (sz > WOLFSSL_MAX_SEND_SZ)
|
||||
sz = WOLFSSL_MAX_SEND_SZ;
|
||||
#endif
|
||||
|
||||
sent = wolfIO_Send(sd, buf, sz, ssl->wflags);
|
||||
if (sent < 0) {
|
||||
int err = wolfSSL_LastError();
|
||||
|
@@ -69,6 +69,29 @@
|
||||
void BSP_Ser_Printf (CPU_CHAR* format, ...);
|
||||
#undef printf
|
||||
#define printf BSP_Ser_Printf
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#include <stdio.h>
|
||||
|
||||
#define BENCH_EMBEDDED
|
||||
|
||||
#define printf printfk
|
||||
|
||||
static int printfk(const char *fmt, ...)
|
||||
{
|
||||
int ret;
|
||||
char line[150];
|
||||
va_list ap;
|
||||
|
||||
va_start(ap, fmt);
|
||||
|
||||
ret = vsnprintf(line, sizeof(line), fmt, ap);
|
||||
line[sizeof(line)-1] = '\0';
|
||||
printk("%s", line);
|
||||
|
||||
va_end(ap);
|
||||
|
||||
return ret;
|
||||
}
|
||||
#else
|
||||
#include <stdio.h>
|
||||
#endif
|
||||
@@ -228,6 +251,7 @@ typedef struct bench_alg {
|
||||
int val;
|
||||
} bench_alg;
|
||||
|
||||
#ifndef MAIN_NO_ARGS
|
||||
/* All recognized cipher algorithm choosing command line options. */
|
||||
static const bench_alg bench_cipher_opt[] = {
|
||||
{ "-cipher", -1 },
|
||||
@@ -410,6 +434,7 @@ static const bench_alg bench_other_opt[] = {
|
||||
#endif
|
||||
{ NULL, 0}
|
||||
};
|
||||
#endif /* MAIN_NO_ARGS */
|
||||
|
||||
#endif /* !WOLFSSL_BENCHMARK_ALL && !NO_MAIN_DRIVER */
|
||||
|
||||
@@ -424,7 +449,9 @@ static const bench_alg bench_other_opt[] = {
|
||||
#endif
|
||||
|
||||
static int lng_index = 0;
|
||||
|
||||
#ifndef NO_MAIN_DRIVER
|
||||
#ifndef MAIN_NO_ARGS
|
||||
static const char* bench_Usage_msg1[][10] = {
|
||||
/* 0 English */
|
||||
{ "-? <num> Help, print this usage\n 0: English, 1: Japanese\n",
|
||||
@@ -453,6 +480,7 @@ static const char* bench_Usage_msg1[][10] = {
|
||||
},
|
||||
#endif
|
||||
};
|
||||
#endif /* MAIN_NO_ARGS */
|
||||
#endif
|
||||
|
||||
static const char* bench_result_words1[][4] = {
|
||||
@@ -1707,6 +1735,8 @@ int benchmark_test(void *args)
|
||||
benchmarks_do(NULL);
|
||||
#endif
|
||||
|
||||
printf("Benchmark complete\n");
|
||||
|
||||
ret = benchmark_free();
|
||||
|
||||
EXIT_TEST(ret);
|
||||
@@ -5252,6 +5282,21 @@ exit_ed_verify:
|
||||
(void)reset;
|
||||
return (double) CPU_TS_Get32()/CPU_TS_TmrFreqGet(&err);
|
||||
}
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
|
||||
#include <time.h>
|
||||
|
||||
double current_time(int reset)
|
||||
{
|
||||
(void)reset;
|
||||
|
||||
#if defined(CONFIG_ARCH_POSIX)
|
||||
k_cpu_idle();
|
||||
#endif
|
||||
|
||||
return (double)k_uptime_get() / 1000;
|
||||
}
|
||||
|
||||
#else
|
||||
|
||||
#include <sys/time.h>
|
||||
@@ -5297,6 +5342,8 @@ void benchmark_configure(int block_size)
|
||||
|
||||
#ifndef NO_MAIN_DRIVER
|
||||
|
||||
#ifndef MAIN_NO_ARGS
|
||||
|
||||
#ifndef WOLFSSL_BENCHMARK_ALL
|
||||
/* Display the algorithm string and keep to 80 characters per line.
|
||||
*
|
||||
@@ -5378,13 +5425,18 @@ static int string_matches(const char* arg, const char* str)
|
||||
int len = (int)XSTRLEN(str) + 1;
|
||||
return XSTRNCMP(arg, str, len) == 0;
|
||||
}
|
||||
#endif /* MAIN_NO_ARGS */
|
||||
|
||||
#ifdef WOLFSSL_ESPIDF
|
||||
int wolf_benchmark_task( )
|
||||
#elif defined(MAIN_NO_ARGS)
|
||||
int main()
|
||||
#else
|
||||
int main(int argc, char** argv)
|
||||
#endif
|
||||
{
|
||||
int ret = 0;
|
||||
#ifndef MAIN_NO_ARGS
|
||||
int optMatched;
|
||||
#ifdef WOLFSSL_ESPIDF
|
||||
int argc = construct_argv();
|
||||
@@ -5393,7 +5445,9 @@ int main(int argc, char** argv)
|
||||
#ifndef WOLFSSL_BENCHMARK_ALL
|
||||
int i;
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#ifndef MAIN_NO_ARGS
|
||||
while (argc > 1) {
|
||||
if (string_matches(argv[1], "-?")) {
|
||||
if(--argc>1){
|
||||
@@ -5499,6 +5553,7 @@ int main(int argc, char** argv)
|
||||
argc--;
|
||||
argv++;
|
||||
}
|
||||
#endif /* MAIN_NO_ARGS */
|
||||
|
||||
#ifdef HAVE_STACK_SIZE
|
||||
ret = StackSizeCheck(NULL, benchmark_test);
|
||||
|
@@ -259,6 +259,8 @@ static void wolfssl_log(const int logLevel, const char *const logMessage)
|
||||
LOG_DEBUG(&mynewt_log, LOG_MODULE_DEFAULT, "%s\n", logMessage);
|
||||
#elif defined(WOLFSSL_ESPIDF)
|
||||
ESP_LOGI("wolfssl", "%s", logMessage);
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
printk("%s\n", logMessage);
|
||||
#else
|
||||
fprintf(stderr, "%s\n", logMessage);
|
||||
#endif
|
||||
|
@@ -53,6 +53,19 @@ Possible memory options:
|
||||
* WOLFSSL_HEAP_TEST: Used for internal testing of heap hint
|
||||
*/
|
||||
|
||||
#ifdef WOLFSSL_ZEPHYR
|
||||
#undef realloc
|
||||
void *z_realloc(void *ptr, size_t size)
|
||||
{
|
||||
if (ptr == NULL)
|
||||
ptr = malloc(size);
|
||||
else
|
||||
ptr = realloc(ptr, size);
|
||||
|
||||
return ptr;
|
||||
}
|
||||
#define realloc z_realloc
|
||||
#endif
|
||||
|
||||
#ifdef USE_WOLFSSL_MEMORY
|
||||
|
||||
|
@@ -148,6 +148,7 @@ int wc_RNG_GenerateByte(WC_RNG* rng, byte* b)
|
||||
#elif defined(MICRIUM)
|
||||
#elif defined(WOLFSSL_NUCLEUS)
|
||||
#elif defined(WOLFSSL_PB)
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#else
|
||||
/* include headers that may be needed to get good seed */
|
||||
#include <fcntl.h>
|
||||
@@ -2157,6 +2158,32 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
|
||||
|
||||
#define USE_TEST_GENSEED
|
||||
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
|
||||
#include <entropy.h>
|
||||
#ifndef _POSIX_C_SOURCE
|
||||
#include <posix/time.h>
|
||||
#else
|
||||
#include <sys/time.h>
|
||||
#endif
|
||||
|
||||
int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
|
||||
{
|
||||
int ret = 0;
|
||||
word32 rand;
|
||||
while (sz > 0) {
|
||||
word32 len = sizeof(rand);
|
||||
if (sz < len)
|
||||
len = sz;
|
||||
rand = sys_rand32_get();
|
||||
XMEMCPY(output, &rand, sz);
|
||||
output += len;
|
||||
sz -= len;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
#elif defined(NO_DEV_RANDOM)
|
||||
|
||||
#error "you need to write an os specific wc_GenerateSeed() here"
|
||||
|
@@ -298,6 +298,37 @@ int wc_ReadDirFirst(ReadDirCtx* ctx, const char* path, char** name)
|
||||
return 0;
|
||||
}
|
||||
} while (FindNextFileA(ctx->hFind, &ctx->FindFileData));
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
if (fs_opendir(&ctx->dir, path) != 0) {
|
||||
WOLFSSL_MSG("opendir path verify locations failed");
|
||||
return BAD_PATH_ERROR;
|
||||
}
|
||||
ctx->dirp = &ctx->dir;
|
||||
|
||||
while ((fs_readdir(&ctx->dir, &ctx->entry)) != 0) {
|
||||
dnameLen = (int)XSTRLEN(ctx->entry.name);
|
||||
|
||||
if (pathLen + dnameLen + 2 >= MAX_FILENAME_SZ) {
|
||||
ret = BAD_PATH_ERROR;
|
||||
break;
|
||||
}
|
||||
XSTRNCPY(ctx->name, path, pathLen + 1);
|
||||
ctx->name[pathLen] = '/';
|
||||
|
||||
/* Use dnameLen + 1 for GCC 8 warnings of truncating d_name. Because
|
||||
* of earlier check it is known that dnameLen is less than
|
||||
* MAX_FILENAME_SZ - (pathLen + 2) so dnameLen +1 will fit */
|
||||
XSTRNCPY(ctx->name + pathLen + 1, ctx->entry.name, dnameLen + 1);
|
||||
if (fs_stat(ctx->name, &ctx->s) != 0) {
|
||||
WOLFSSL_MSG("stat on name failed");
|
||||
ret = BAD_PATH_ERROR;
|
||||
break;
|
||||
} else if (ctx->s.type == FS_DIR_ENTRY_FILE) {
|
||||
if (name)
|
||||
*name = ctx->name;
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
#else
|
||||
ctx->dir = opendir(path);
|
||||
if (ctx->dir == NULL) {
|
||||
@@ -370,6 +401,31 @@ int wc_ReadDirNext(ReadDirCtx* ctx, const char* path, char** name)
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
while ((fs_readdir(&ctx->dir, &ctx->entry)) != 0) {
|
||||
dnameLen = (int)XSTRLEN(ctx->entry.name);
|
||||
|
||||
if (pathLen + dnameLen + 2 >= MAX_FILENAME_SZ) {
|
||||
ret = BAD_PATH_ERROR;
|
||||
break;
|
||||
}
|
||||
XSTRNCPY(ctx->name, path, pathLen + 1);
|
||||
ctx->name[pathLen] = '/';
|
||||
/* Use dnameLen + 1 for GCC 8 warnings of truncating d_name. Because
|
||||
* of earlier check it is known that dnameLen is less than
|
||||
* MAX_FILENAME_SZ - (pathLen + 2) so that dnameLen +1 will fit */
|
||||
XSTRNCPY(ctx->name + pathLen + 1, ctx->entry.name, dnameLen + 1);
|
||||
|
||||
if (fs_stat(ctx->name, &ctx->s) != 0) {
|
||||
WOLFSSL_MSG("stat on name failed");
|
||||
ret = BAD_PATH_ERROR;
|
||||
break;
|
||||
} else if (ctx->s.type == FS_DIR_ENTRY_FILE) {
|
||||
if (name)
|
||||
*name = ctx->name;
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
#else
|
||||
while ((ctx->entry = readdir(ctx->dir)) != NULL) {
|
||||
dnameLen = (int)XSTRLEN(ctx->entry->d_name);
|
||||
@@ -413,6 +469,11 @@ void wc_ReadDirClose(ReadDirCtx* ctx)
|
||||
FindClose(ctx->hFind);
|
||||
ctx->hFind = INVALID_HANDLE_VALUE;
|
||||
}
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
if (ctx->dirp) {
|
||||
fs_closedir(ctx->dirp);
|
||||
ctx->dirp = NULL;
|
||||
}
|
||||
#else
|
||||
if (ctx->dir) {
|
||||
closedir(ctx->dir);
|
||||
@@ -423,6 +484,37 @@ void wc_ReadDirClose(ReadDirCtx* ctx)
|
||||
|
||||
#endif /* !NO_FILESYSTEM && !NO_WOLFSSL_DIR */
|
||||
|
||||
#if !defined(NO_FILESYSTEM) && defined(WOLFSSL_ZEPHYR)
|
||||
XFILE z_fs_open(const char* filename, const char* perm)
|
||||
{
|
||||
XFILE file;
|
||||
|
||||
file = XMALLOC(sizeof(*file), NULL, DYNAMIC_TYPE_FILE);
|
||||
if (file != NULL) {
|
||||
if (fs_open(file, filename) != 0) {
|
||||
XFREE(file);
|
||||
file = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
return file;
|
||||
}
|
||||
|
||||
int z_fs_close(XFILE file)
|
||||
{
|
||||
int ret;
|
||||
|
||||
if (file == NULL)
|
||||
return -1;
|
||||
ret = (fs_close(file) == 0) ? 0 : -1;
|
||||
|
||||
XFREE(file, NULL, DYNAMIC_TYPE_FILE);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
#endif /* !NO_FILESYSTEM && !NO_WOLFSSL_DIR */
|
||||
|
||||
|
||||
wolfSSL_Mutex* wc_InitAndAllocMutex(void)
|
||||
{
|
||||
@@ -1468,6 +1560,37 @@ int wolfSSL_CryptHwMutexUnLock(void) {
|
||||
return BAD_MUTEX_E;
|
||||
}
|
||||
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
|
||||
int wc_InitMutex(wolfSSL_Mutex* m)
|
||||
{
|
||||
k_mutex_init(m);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int wc_FreeMutex(wolfSSL_Mutex* m)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
int wc_LockMutex(wolfSSL_Mutex* m)
|
||||
{
|
||||
int ret = 0;
|
||||
|
||||
if (k_mutex_lock(m, K_FOREVER) != 0)
|
||||
ret = BAD_MUTEX_E;
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
int wc_UnLockMutex(wolfSSL_Mutex* m)
|
||||
{
|
||||
k_mutex_unlock(m);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#else
|
||||
#warning No mutex handling defined
|
||||
|
||||
@@ -1639,7 +1762,6 @@ time_t deos_time(time_t* timer)
|
||||
}
|
||||
#endif /* WOLFSSL_DEOS */
|
||||
|
||||
|
||||
#if defined(MICRIUM)
|
||||
|
||||
time_t micrium_time(time_t* timer)
|
||||
@@ -1717,6 +1839,22 @@ time_t XTIME(time_t * timer)
|
||||
}
|
||||
|
||||
#endif /* WOLFSSL_XILINX */
|
||||
|
||||
#if defined(WOLFSSL_ZEPHYR)
|
||||
|
||||
time_t z_time(time_t * timer)
|
||||
{
|
||||
struct timespec ts;
|
||||
|
||||
if (clock_gettime(CLOCK_REALTIME, &ts) == 0)
|
||||
if (timer != NULL)
|
||||
*timer = ts.tv_sec;
|
||||
|
||||
return ts.tv_sec;
|
||||
}
|
||||
|
||||
#endif /* WOLFSSL_ZEPHYR */
|
||||
|
||||
#endif /* !NO_ASN_TIME */
|
||||
|
||||
#ifndef WOLFSSL_LEANPSK
|
||||
|
File diff suppressed because it is too large
Load Diff
@@ -169,6 +169,10 @@
|
||||
void mynewt_ctx_clear(void *ctx);
|
||||
void* mynewt_ctx_new();
|
||||
#endif
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#ifndef SINGLE_THREADED
|
||||
#include <kernel.h>
|
||||
#endif
|
||||
#else
|
||||
#ifndef SINGLE_THREADED
|
||||
#define WOLFSSL_PTHREADS
|
||||
@@ -2726,8 +2730,6 @@ struct WOLFSSL_CTX {
|
||||
#endif
|
||||
};
|
||||
|
||||
WOLFSSL_LOCAL
|
||||
WOLFSSL_CTX* wolfSSL_CTX_new_ex(WOLFSSL_METHOD* method, void* heap);
|
||||
WOLFSSL_LOCAL
|
||||
int InitSSL_Ctx(WOLFSSL_CTX*, WOLFSSL_METHOD*, void* heap);
|
||||
WOLFSSL_LOCAL
|
||||
|
@@ -568,6 +568,7 @@ WOLFSSL_API int wolfSSL_use_RSAPrivateKey_file(WOLFSSL*, const char*, int);
|
||||
|
||||
#endif /* !NO_FILESYSTEM && !NO_CERTS */
|
||||
|
||||
WOLFSSL_API WOLFSSL_CTX* wolfSSL_CTX_new_ex(WOLFSSL_METHOD* method, void* heap);
|
||||
WOLFSSL_API WOLFSSL_CTX* wolfSSL_CTX_new(WOLFSSL_METHOD*);
|
||||
WOLFSSL_API WOLFSSL* wolfSSL_new(WOLFSSL_CTX*);
|
||||
WOLFSSL_API WOLFSSL_CTX* wolfSSL_get_SSL_CTX(WOLFSSL* ssl);
|
||||
@@ -1707,7 +1708,8 @@ WOLFSSL_API int wolfSSL_make_eap_keys(WOLFSSL*, void* key, unsigned int len,
|
||||
#elif !defined(WOLFSSL_MDK_ARM) && !defined(WOLFSSL_IAR_ARM) && \
|
||||
!defined(WOLFSSL_PICOTCP) && !defined(WOLFSSL_ROWLEY_ARM) && \
|
||||
!defined(WOLFSSL_EMBOS) && !defined(WOLFSSL_FROSTED) && \
|
||||
!defined(WOLFSSL_CHIBIOS) && !defined(WOLFSSL_CONTIKI)
|
||||
!defined(WOLFSSL_CHIBIOS) && !defined(WOLFSSL_CONTIKI) && \
|
||||
!defined(WOLFSSL_ZEPHYR)
|
||||
#include <sys/uio.h>
|
||||
#endif
|
||||
/* allow writev style writing */
|
||||
|
@@ -93,6 +93,30 @@
|
||||
#include <netdb.h>
|
||||
#include <pthread.h>
|
||||
#define SOCKET_T int
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
#include <net/socket.h>
|
||||
#define SOCKET_T int
|
||||
#define SOL_SOCKET 1
|
||||
#define SO_REUSEADDR 201
|
||||
#define WOLFSSL_USE_GETADDRINFO
|
||||
|
||||
static unsigned long inet_addr(const char *cp)
|
||||
{
|
||||
unsigned int a[4]; unsigned long ret;
|
||||
int i, j;
|
||||
for (i=0, j=0; i<4; i++) {
|
||||
a[i] = 0;
|
||||
while (cp[j] != '.' && cp[j] != '\0') {
|
||||
a[i] *= 10;
|
||||
a[i] += cp[j] - '0';
|
||||
j++;
|
||||
}
|
||||
}
|
||||
ret = ((a[3]<<24) + (a[2]<<16) + (a[1]<<8) + a[0]) ;
|
||||
return(ret) ;
|
||||
}
|
||||
#else
|
||||
#include <string.h>
|
||||
#include <sys/types.h>
|
||||
@@ -203,6 +227,10 @@
|
||||
typedef void THREAD_RETURN;
|
||||
typedef Task_Handle THREAD_TYPE;
|
||||
#define WOLFSSL_THREAD
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
typedef void THREAD_RETURN;
|
||||
typedef struct k_thread THREAD_TYPE;
|
||||
#define WOLFSSL_THREAD
|
||||
#else
|
||||
typedef unsigned int THREAD_RETURN;
|
||||
typedef intptr_t THREAD_TYPE;
|
||||
@@ -371,7 +399,11 @@ typedef struct func_args {
|
||||
|
||||
void wait_tcp_ready(func_args*);
|
||||
|
||||
#ifdef WOLFSSL_ZEPHYR
|
||||
typedef void THREAD_FUNC(void*, void*, void*);
|
||||
#else
|
||||
typedef THREAD_RETURN WOLFSSL_THREAD THREAD_FUNC(void*);
|
||||
#endif
|
||||
|
||||
void start_thread(THREAD_FUNC, func_args*, THREAD_TYPE*);
|
||||
void join_thread(THREAD_TYPE);
|
||||
@@ -394,7 +426,10 @@ static const word16 wolfSSLPort = 11111;
|
||||
#define EXIT_FAILURE 1
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_FORCE_MALLOC_FAIL_TEST
|
||||
#if defined(WOLFSSL_FORCE_MALLOC_FAIL_TEST) || defined(WOLFSSL_ZEPHYR)
|
||||
#ifndef EXIT_SUCCESS
|
||||
#define EXIT_SUCCESS 0
|
||||
#endif
|
||||
#define XEXIT(rc) return rc
|
||||
#define XEXIT_T(rc) return (THREAD_RETURN)rc
|
||||
#else
|
||||
@@ -404,7 +439,7 @@ static const word16 wolfSSLPort = 11111;
|
||||
|
||||
|
||||
static WC_INLINE
|
||||
#ifdef WOLFSSL_FORCE_MALLOC_FAIL_TEST
|
||||
#if defined(WOLFSSL_FORCE_MALLOC_FAIL_TEST) || defined(WOLFSSL_ZEPHYR)
|
||||
THREAD_RETURN
|
||||
#else
|
||||
WC_NORETURN void
|
||||
@@ -751,6 +786,7 @@ static WC_INLINE void build_addr(SOCKADDR_IN_T* addr, const char* peer,
|
||||
#ifndef TEST_IPV6
|
||||
/* peer could be in human readable form */
|
||||
if ( ((size_t)peer != INADDR_ANY) && isalpha((int)peer[0])) {
|
||||
#ifndef WOLFSSL_USE_GETADDRINFO
|
||||
#if defined(WOLFSSL_MDK_ARM) || defined(WOLFSSL_KEIL_TCP_NET)
|
||||
int err;
|
||||
struct hostent* entry = gethostbyname(peer, &err);
|
||||
@@ -767,6 +803,19 @@ static WC_INLINE void build_addr(SOCKADDR_IN_T* addr, const char* peer,
|
||||
entry->h_length);
|
||||
useLookup = 1;
|
||||
}
|
||||
#else
|
||||
struct zsock_addrinfo hints, *addrInfo;
|
||||
char portStr[6];
|
||||
XSNPRINTF(portStr, sizeof(portStr), "%d", port);
|
||||
memset(&hints, 0, sizeof(hints));
|
||||
hints.ai_family = AF_UNSPEC;
|
||||
hints.ai_socktype = udp ? SOCK_DGRAM : SOCK_STREAM;
|
||||
hints.ai_protocol = udp ? IPPROTO_UDP : IPPROTO_TCP;
|
||||
if (getaddrinfo((char*)peer, portStr, &hints, &addrInfo) == 0) {
|
||||
XMEMCPY(addr, addrInfo->ai_addr, sizeof(*addr));
|
||||
useLookup = 1;
|
||||
}
|
||||
#endif
|
||||
else
|
||||
err_sys("no entry for host");
|
||||
}
|
||||
@@ -862,7 +911,7 @@ static WC_INLINE void tcp_socket(SOCKET_T* sockfd, int udp, int sctp)
|
||||
err_sys("setsockopt SO_NOSIGPIPE failed\n");
|
||||
}
|
||||
#elif defined(WOLFSSL_MDK_ARM) || defined (WOLFSSL_TIRTOS) ||\
|
||||
defined(WOLFSSL_KEIL_TCP_NET)
|
||||
defined(WOLFSSL_KEIL_TCP_NET) || defined(WOLFSSL_ZEPHYR)
|
||||
/* nothing to define */
|
||||
#else /* no S_NOSIGPIPE */
|
||||
signal(SIGPIPE, SIG_IGN);
|
||||
@@ -993,7 +1042,7 @@ static WC_INLINE void tcp_listen(SOCKET_T* sockfd, word16* port, int useAnyAddr,
|
||||
tcp_socket(sockfd, udp, sctp);
|
||||
|
||||
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_MDK_ARM)\
|
||||
&& !defined(WOLFSSL_KEIL_TCP_NET)
|
||||
&& !defined(WOLFSSL_KEIL_TCP_NET) && !defined(WOLFSSL_ZEPHYR)
|
||||
{
|
||||
int res, on = 1;
|
||||
socklen_t len = sizeof(on);
|
||||
@@ -1014,7 +1063,8 @@ static WC_INLINE void tcp_listen(SOCKET_T* sockfd, word16* port, int useAnyAddr,
|
||||
if (listen(*sockfd, SOCK_LISTEN_MAX_QUEUE) != 0)
|
||||
err_sys("tcp listen failed");
|
||||
}
|
||||
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_TIRTOS)
|
||||
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_TIRTOS) \
|
||||
&& !defined(WOLFSSL_ZEPHYR)
|
||||
if (*port == 0) {
|
||||
socklen_t len = sizeof(addr);
|
||||
if (getsockname(*sockfd, (struct sockaddr*)&addr, &len) == 0) {
|
||||
@@ -1062,7 +1112,7 @@ static WC_INLINE void udp_accept(SOCKET_T* sockfd, SOCKET_T* clientfd,
|
||||
|
||||
|
||||
#if !defined(USE_WINDOWS_API) && !defined(WOLFSSL_MDK_ARM) \
|
||||
&& !defined(WOLFSSL_KEIL_TCP_NET)
|
||||
&& !defined(WOLFSSL_KEIL_TCP_NET) && !defined(WOLFSSL_ZEPHYR)
|
||||
{
|
||||
int res, on = 1;
|
||||
socklen_t len = sizeof(on);
|
||||
@@ -1186,7 +1236,8 @@ static WC_INLINE void tcp_set_nonblocking(SOCKET_T* sockfd)
|
||||
if (ret == SOCKET_ERROR)
|
||||
err_sys("ioctlsocket failed");
|
||||
#elif defined(WOLFSSL_MDK_ARM) || defined(WOLFSSL_KEIL_TCP_NET) \
|
||||
|| defined (WOLFSSL_TIRTOS)|| defined(WOLFSSL_VXWORKS)
|
||||
|| defined (WOLFSSL_TIRTOS)|| defined(WOLFSSL_VXWORKS) \
|
||||
|| defined(WOLFSSL_ZEPHYR)
|
||||
/* non blocking not supported, for now */
|
||||
#else
|
||||
int flags = fcntl(*sockfd, F_GETFL, 0);
|
||||
@@ -1357,6 +1408,8 @@ static WC_INLINE unsigned int my_psk_server_tls13_cb(WOLFSSL* ssl,
|
||||
|
||||
#elif defined(WOLFSSL_TIRTOS)
|
||||
extern double current_time();
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
extern double current_time();
|
||||
#else
|
||||
|
||||
#if !defined(WOLFSSL_MDK_ARM) && !defined(WOLFSSL_KEIL_TCP_NET) && !defined(WOLFSSL_CHIBIOS)
|
||||
|
@@ -1378,6 +1378,28 @@ extern void uITRON4_free(void *p) ;
|
||||
|
||||
#endif /*(WOLFSSL_APACHE_MYNEWT)*/
|
||||
|
||||
#ifdef WOLFSSL_ZEPHYR
|
||||
#include <zephyr.h>
|
||||
#include <misc/printk.h>
|
||||
#include <misc/util.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
#define WOLFSSL_DH_CONST
|
||||
#define WOLFSSL_HAVE_MIN
|
||||
#define WOLFSSL_HAVE_MAX
|
||||
#define NO_WRITEV
|
||||
|
||||
#define USE_FLAT_BENCHMARK_H
|
||||
#define USE_FLAT_TEST_H
|
||||
#define EXIT_FAILURE 1
|
||||
#define MAIN_NO_ARGS
|
||||
|
||||
void *z_realloc(void *ptr, size_t size);
|
||||
#define realloc z_realloc
|
||||
|
||||
#define CONFIG_NET_SOCKETS_POSIX_NAMES
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_IMX6
|
||||
#ifndef SIZEOF_LONG_LONG
|
||||
#define SIZEOF_LONG_LONG 8
|
||||
|
@@ -175,7 +175,8 @@
|
||||
#if defined(_MSC_VER)
|
||||
#define THREAD_LS_T __declspec(thread)
|
||||
/* Thread local storage only in FreeRTOS v8.2.1 and higher */
|
||||
#elif defined(FREERTOS) || defined(FREERTOS_TCP)
|
||||
#elif defined(FREERTOS) || defined(FREERTOS_TCP) || \
|
||||
defined(WOLFSSL_ZEPHYR)
|
||||
#define THREAD_LS_T
|
||||
#else
|
||||
#define THREAD_LS_T __thread
|
||||
@@ -360,7 +361,8 @@
|
||||
#endif
|
||||
|
||||
#ifndef XSTRNCASECMP
|
||||
#if defined(MICROCHIP_PIC32) || defined(WOLFSSL_TIRTOS)
|
||||
#if defined(MICROCHIP_PIC32) || defined(WOLFSSL_TIRTOS) || \
|
||||
defined(WOLFSSL_ZEPHYR)
|
||||
/* XC32 does not support strncasecmp, so use case sensitive one */
|
||||
#define XSTRNCASECMP(s1,s2,n) strncmp((s1),(s2),(n))
|
||||
#elif defined(USE_WINDOWS_API) || defined(FREERTOS_TCP_WINSIM)
|
||||
|
@@ -108,6 +108,10 @@
|
||||
#include "nucleus.h"
|
||||
#elif defined(WOLFSSL_APACHE_MYNEWT)
|
||||
/* do nothing */
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#ifndef SINGLE_THREADED
|
||||
#include <kernel.h>
|
||||
#endif
|
||||
#else
|
||||
#ifndef SINGLE_THREADED
|
||||
#define WOLFSSL_PTHREADS
|
||||
@@ -185,6 +189,8 @@
|
||||
typedef RTHANDLE wolfSSL_Mutex;
|
||||
#elif defined(WOLFSSL_NUCLEUS_1_2)
|
||||
typedef NU_SEMAPHORE wolfSSL_Mutex;
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
typedef struct k_mutex wolfSSL_Mutex;
|
||||
#else
|
||||
#error Need a mutex type in multithreaded mode
|
||||
#endif /* USE_WINDOWS_API */
|
||||
@@ -321,6 +327,27 @@ WOLFSSL_API int wolfCrypt_Cleanup(void);
|
||||
#define XSEEK_END 2
|
||||
#define XBADFILE NULL
|
||||
#define XFGETS(b,s,f) -2 /* Not ported yet */
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#include <fs.h>
|
||||
|
||||
#define XFILE struct fs_file_t*
|
||||
#define STAT struct fs_dirent
|
||||
|
||||
XFILE z_fs_open(const char* filename, const char* perm);
|
||||
int z_fs_close(XFILE file);
|
||||
|
||||
#define XFOPEN z_fs_open
|
||||
#define XFCLOSE z_fs_close
|
||||
#define XFSEEK fs_seek
|
||||
#define XFTELL fs_tell
|
||||
#define XFREWIND fs_rewind
|
||||
#define XREWIND(F) fs_seek(F, 0, FS_SEEK_SET)
|
||||
#define XFREAD(P,S,N,F) fs_read(F, P, S*N)
|
||||
#define XFWRITE(P,S,N,F) fs_write(F, P, S*N)
|
||||
#define XSEEK_END FS_SEEK_END
|
||||
#define XBADFILE NULL
|
||||
#define XFGETS(b,s,f) -2 /* Not ported yet */
|
||||
|
||||
#elif defined(WOLFSSL_USER_FILESYSTEM)
|
||||
/* To be defined in user_settings.h */
|
||||
#else
|
||||
@@ -364,6 +391,11 @@ WOLFSSL_API int wolfCrypt_Cleanup(void);
|
||||
#ifdef USE_WINDOWS_API
|
||||
WIN32_FIND_DATAA FindFileData;
|
||||
HANDLE hFind;
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
struct fs_dirent entry;
|
||||
struct fs_dir_t dir;
|
||||
struct fs_dirent s;
|
||||
struct fs_dir_t* dirp;
|
||||
#else
|
||||
struct dirent* entry;
|
||||
DIR* dir;
|
||||
@@ -486,6 +518,24 @@ WOLFSSL_API int wolfCrypt_Cleanup(void);
|
||||
#define WOLFSSL_GMTIME
|
||||
#define USE_WOLF_TM
|
||||
#define USE_WOLF_TIME_T
|
||||
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#ifndef _POSIX_C_SOURCE
|
||||
#include <posix/time.h>
|
||||
#else
|
||||
#include <sys/time.h>
|
||||
#endif
|
||||
|
||||
typedef signed int time_t;
|
||||
|
||||
time_t z_time(time_t *timer);
|
||||
|
||||
#define XTIME(tl) z_time((tl))
|
||||
#define XGMTIME(c, t) gmtime((c))
|
||||
#define WOLFSSL_GMTIME
|
||||
|
||||
#define USE_WOLF_TM
|
||||
|
||||
#else
|
||||
/* default */
|
||||
/* uses complete <time.h> facility */
|
||||
|
@@ -116,6 +116,8 @@
|
||||
#include <socketapi.h>
|
||||
#include <lwip-socket.h>
|
||||
#include <errno.h>
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#include <net/socket.h>
|
||||
#elif !defined(WOLFSSL_NO_SOCK)
|
||||
#include <sys/types.h>
|
||||
#include <errno.h>
|
||||
@@ -257,6 +259,13 @@
|
||||
#elif defined(WOLFSSL_NUCLEUS_1_2)
|
||||
#define SEND_FUNCTION NU_Send
|
||||
#define RECV_FUNCTION NU_Recv
|
||||
#elif defined(WOLFSSL_ZEPHYR)
|
||||
#ifndef WOLFSSL_MAX_SEND_SZ
|
||||
#define WOLFSSL_MAX_SEND_SZ 256
|
||||
#endif
|
||||
|
||||
#define SEND_FUNCTION send
|
||||
#define RECV_FUNCTION recv
|
||||
#else
|
||||
#define SEND_FUNCTION send
|
||||
#define RECV_FUNCTION recv
|
||||
|
Reference in New Issue
Block a user