move client example and echoserver example to CyaSSL API only, echoclient and server are still OpenSSL compatibility

This commit is contained in:
toddouska
2011-11-03 10:56:15 -07:00
parent 11d15f32b9
commit 771912bf4f
3 changed files with 102 additions and 99 deletions

View File

@@ -157,15 +157,17 @@ static int PasswordCallBack(char* passwd, int sz, int rw, void* userdata)
#endif #endif
static INLINE void showPeer(SSL* ssl) static INLINE void showPeer(CYASSL* ssl)
{ {
#ifdef OPENSSL_EXTRA #ifdef OPENSSL_EXTRA
SSL_CIPHER* cipher; CYASSL_CIPHER* cipher;
X509* peer = SSL_get_peer_certificate(ssl); CYASSL_X509* peer = CyaSSL_get_peer_certificate(ssl);
if (peer) { if (peer) {
char* issuer = X509_NAME_oneline(X509_get_issuer_name(peer), 0, 0); char* issuer = CyaSSL_X509_NAME_oneline(
char* subject = X509_NAME_oneline(X509_get_subject_name(peer), 0, 0); CyaSSL_X509_get_issuer_name(peer), 0, 0);
char* subject = CyaSSL_X509_NAME_oneline(
CyaSSL_X509_get_subject_name(peer), 0, 0);
byte serial[32]; byte serial[32];
int ret; int ret;
int sz = sizeof(serial); int sz = sizeof(serial);
@@ -191,10 +193,10 @@ static INLINE void showPeer(SSL* ssl)
} }
else else
printf("peer has no cert!\n"); printf("peer has no cert!\n");
printf("SSL version is %s\n", SSL_get_version(ssl)); printf("SSL version is %s\n", CyaSSL_get_version(ssl));
cipher = SSL_get_current_cipher(ssl); cipher = CyaSSL_get_current_cipher(ssl);
printf("SSL cipher suite is %s\n", SSL_CIPHER_get_name(cipher)); printf("SSL cipher suite is %s\n", CyaSSL_CIPHER_get_name(cipher));
#endif #endif
#if defined(SESSION_CERTS) && defined(SHOW_CERTS) #if defined(SESSION_CERTS) && defined(SHOW_CERTS)
@@ -420,7 +422,7 @@ static INLINE void tcp_set_nonblocking(SOCKET_T* sockfd)
#ifndef NO_PSK #ifndef NO_PSK
static INLINE unsigned int my_psk_client_cb(SSL* ssl, const char* hint, static INLINE unsigned int my_psk_client_cb(CYASSL* ssl, const char* hint,
char* identity, unsigned int id_max_len, unsigned char* key, char* identity, unsigned int id_max_len, unsigned char* key,
unsigned int key_max_len) unsigned int key_max_len)
{ {
@@ -439,7 +441,7 @@ static INLINE unsigned int my_psk_client_cb(SSL* ssl, const char* hint,
} }
static INLINE unsigned int my_psk_server_cb(SSL* ssl, const char* identity, static INLINE unsigned int my_psk_server_cb(CYASSL* ssl, const char* identity,
unsigned char* key, unsigned int key_max_len) unsigned char* key, unsigned int key_max_len)
{ {
/* identity is OpenSSL testing default for openssl s_client, keep same */ /* identity is OpenSSL testing default for openssl s_client, keep same */
@@ -545,13 +547,14 @@ static int myVerify(int preverify, X509_STORE_CTX* store)
char buffer[80]; char buffer[80];
printf("In verification callback, error = %d, %s\n", store->error, printf("In verification callback, error = %d, %s\n", store->error,
ERR_error_string(store->error, buffer)); CyaSSL_ERR_error_string(store->error, buffer));
#ifdef OPENSSL_EXTRA #ifdef OPENSSL_EXTRA
X509* peer = store->current_cert; CYASSL_X509* peer = store->current_cert;
if (peer) { if (peer) {
char* issuer = X509_NAME_oneline(X509_get_issuer_name(peer), 0, 0); char* issuer = CYASS_X509_NAME_oneline(
char* subject = X509_NAME_oneline(X509_get_subject_name(peer), 0, 0); CYASSL_X509_get_issuer_name(peer), 0, 0);
char* subject = CYASSL_X509_NAME_oneline(
CYASSL_X509_get_subject_name(peer), 0, 0);
printf("peer's cert info:\n issuer : %s\n subject: %s\n", issuer, printf("peer's cert info:\n issuer : %s\n subject: %s\n", issuer,
subject); subject);
XFREE(subject, 0, DYNAMIC_TYPE_OPENSSL); XFREE(subject, 0, DYNAMIC_TYPE_OPENSSL);
@@ -568,7 +571,7 @@ static int myVerify(int preverify, X509_STORE_CTX* store)
#endif /* VERIFY_CALLBACK */ #endif /* VERIFY_CALLBACK */
static INLINE void SetDH(SSL* ssl) static INLINE void SetDH(CYASSL* ssl)
{ {
/* dh1024 p */ /* dh1024 p */
static unsigned char p[] = static unsigned char p[] =
@@ -595,7 +598,7 @@ static INLINE void SetDH(SSL* ssl)
CyaSSL_SetTmpDH(ssl, p, sizeof(p), g, sizeof(g)); CyaSSL_SetTmpDH(ssl, p, sizeof(p), g, sizeof(g));
} }
static INLINE void SetDHCtx(SSL_CTX* ctx) static INLINE void SetDHCtx(CYASSL_CTX* ctx)
{ {
/* dh1024 p */ /* dh1024 p */
static unsigned char p[] = static unsigned char p[] =

View File

@@ -23,7 +23,7 @@
#include <config.h> #include <config.h>
#endif #endif
#include <cyassl/openssl/ssl.h> #include <cyassl/ssl.h>
#include <cyassl/test.h> #include <cyassl/test.h>
/* /*
@@ -38,14 +38,14 @@
#endif #endif
#if defined(NON_BLOCKING) || defined(CYASSL_CALLBACKS) #if defined(NON_BLOCKING) || defined(CYASSL_CALLBACKS)
void NonBlockingSSL_Connect(SSL* ssl) void NonBlockingSSL_Connect(CyaSSL* ssl)
{ {
#ifndef CYASSL_CALLBACKS #ifndef CYASSL_CALLBACKS
int ret = SSL_connect(ssl); int ret = CyaSSL_connect(ssl);
#else #else
int ret = CyaSSL_connect_ex(ssl, handShakeCB, timeoutCB, timeout); int ret = CyaSSL_connect_ex(ssl, handShakeCB, timeoutCB, timeout);
#endif #endif
int error = SSL_get_error(ssl, 0); int error = CyaSSL_get_error(ssl, 0);
while (ret != SSL_SUCCESS && (error == SSL_ERROR_WANT_READ || while (ret != SSL_SUCCESS && (error == SSL_ERROR_WANT_READ ||
error == SSL_ERROR_WANT_WRITE)) { error == SSL_ERROR_WANT_WRITE)) {
if (error == SSL_ERROR_WANT_READ) if (error == SSL_ERROR_WANT_READ)
@@ -58,11 +58,11 @@
sleep(1); sleep(1);
#endif #endif
#ifndef CYASSL_CALLBACKS #ifndef CYASSL_CALLBACKS
ret = SSL_connect(ssl); ret = CyaSSL_connect(ssl);
#else #else
ret = CyaSSL_connect_ex(ssl, handShakeCB, timeoutCB, timeout); ret = CyaSSL_connect_ex(ssl, handShakeCB, timeoutCB, timeout);
#endif #endif
error = SSL_get_error(ssl, 0); error = CyaSSL_get_error(ssl, 0);
} }
if (ret != SSL_SUCCESS) if (ret != SSL_SUCCESS)
err_sys("SSL_connect failed"); err_sys("SSL_connect failed");
@@ -74,13 +74,13 @@ void client_test(void* args)
{ {
SOCKET_T sockfd = 0; SOCKET_T sockfd = 0;
SSL_METHOD* method = 0; CYASSL_METHOD* method = 0;
SSL_CTX* ctx = 0; CYASSL_CTX* ctx = 0;
SSL* ssl = 0; CYASSL* ssl = 0;
#ifdef TEST_RESUME #ifdef TEST_RESUME
SSL* sslResume = 0; CYASSL* sslResume = 0;
SSL_SESSION* session = 0; CYASSL_SESSION* session = 0;
char resumeMsg[] = "resuming cyassl!"; char resumeMsg[] = "resuming cyassl!";
int resumeSz = sizeof(resumeMsg); int resumeSz = sizeof(resumeMsg);
#endif #endif
@@ -96,32 +96,32 @@ void client_test(void* args)
((func_args*)args)->return_code = -1; /* error state */ ((func_args*)args)->return_code = -1; /* error state */
#if defined(CYASSL_DTLS) #if defined(CYASSL_DTLS)
method = DTLSv1_client_method(); method = CyaDTLSv1_client_method();
#elif !defined(NO_TLS) #elif !defined(NO_TLS)
method = SSLv23_client_method(); method = CyaSSLv23_client_method();
#else #else
method = SSLv3_client_method(); method = CyaSSLv3_client_method();
#endif #endif
ctx = SSL_CTX_new(method); ctx = CyaSSL_CTX_new(method);
#ifndef NO_PSK #ifndef NO_PSK
SSL_CTX_set_psk_client_callback(ctx, my_psk_client_cb); CyaSSL_CTX_set_psk_client_callback(ctx, my_psk_client_cb);
#endif #endif
#ifdef OPENSSL_EXTRA #ifdef OPENSSL_EXTRA
SSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack); CyaSSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack);
#endif #endif
#if defined(CYASSL_SNIFFER) && !defined(HAVE_NTRU) && !defined(HAVE_ECC) #if defined(CYASSL_SNIFFER) && !defined(HAVE_NTRU) && !defined(HAVE_ECC)
/* don't use EDH, can't sniff tmp keys */ /* don't use EDH, can't sniff tmp keys */
SSL_CTX_set_cipher_list(ctx, "AES256-SHA"); CyaSSL_CTX_set_cipher_list(ctx, "AES256-SHA");
#endif #endif
#ifndef NO_FILESYSTEM #ifndef NO_FILESYSTEM
if (SSL_CTX_load_verify_locations(ctx, caCert, 0) != SSL_SUCCESS) if (CyaSSL_CTX_load_verify_locations(ctx, caCert, 0) != SSL_SUCCESS)
err_sys("can't load ca file, Please run from CyaSSL home dir"); err_sys("can't load ca file, Please run from CyaSSL home dir");
#ifdef HAVE_ECC #ifdef HAVE_ECC
if (SSL_CTX_load_verify_locations(ctx, eccCert, 0) != SSL_SUCCESS) if (CyaSSL_CTX_load_verify_locations(ctx, eccCert, 0) != SSL_SUCCESS)
err_sys("can't load ca file, Please run from CyaSSL home dir"); err_sys("can't load ca file, Please run from CyaSSL home dir");
#endif #endif
#else #else
@@ -129,12 +129,12 @@ void client_test(void* args)
#endif #endif
#ifdef VERIFY_CALLBACK #ifdef VERIFY_CALLBACK
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, myVerify); CyaSSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, myVerify);
#endif #endif
if (argc == 3) { if (argc == 3) {
/* ./client server securePort */ /* ./client server securePort */
SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0); /* TODO: add ca cert */ CyaSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0); /* TODO: add ca cert */
/* this is just to allow easy testing of other servers */ /* this is just to allow easy testing of other servers */
tcp_connect(&sockfd, argv[1], (short)atoi(argv[2])); tcp_connect(&sockfd, argv[1], (short)atoi(argv[2]));
} }
@@ -142,12 +142,12 @@ void client_test(void* args)
/* ./client // plain mode */ /* ./client // plain mode */
/* for client cert authentication if server requests */ /* for client cert authentication if server requests */
#ifndef NO_FILESYSTEM #ifndef NO_FILESYSTEM
if (SSL_CTX_use_certificate_file(ctx, cliCert, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_certificate_file(ctx, cliCert, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load client cert file, " err_sys("can't load client cert file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
if (SSL_CTX_use_PrivateKey_file(ctx, cliKey, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_PrivateKey_file(ctx, cliKey, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load client key file, " err_sys("can't load client key file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
@@ -167,13 +167,13 @@ void client_test(void* args)
for (i = 0; i < times; i++) { for (i = 0; i < times; i++) {
tcp_connect(&sockfd, yasslIP, yasslPort); tcp_connect(&sockfd, yasslIP, yasslPort);
ssl = SSL_new(ctx); ssl = CyaSSL_new(ctx);
SSL_set_fd(ssl, sockfd); CyaSSL_set_fd(ssl, sockfd);
if (SSL_connect(ssl) != SSL_SUCCESS) if (CyaSSL_connect(ssl) != SSL_SUCCESS)
err_sys("SSL_connect failed"); err_sys("SSL_connect failed");
SSL_shutdown(ssl); CyaSSL_shutdown(ssl);
SSL_free(ssl); CyaSSL_free(ssl);
CloseSocket(sockfd); CloseSocket(sockfd);
} }
avg = current_time() - start; avg = current_time() - start;
@@ -181,15 +181,15 @@ void client_test(void* args)
avg *= 1000; /* milliseconds */ avg *= 1000; /* milliseconds */
printf("SSL_connect avg took:%6.3f milliseconds\n", avg); printf("SSL_connect avg took:%6.3f milliseconds\n", avg);
SSL_CTX_free(ctx); CyaSSL_CTX_free(ctx);
((func_args*)args)->return_code = 0; ((func_args*)args)->return_code = 0;
return; return;
} }
else else
err_sys("usage: ./client server securePort"); err_sys("usage: ./client server securePort");
ssl = SSL_new(ctx); ssl = CyaSSL_new(ctx);
SSL_set_fd(ssl, sockfd); CyaSSL_set_fd(ssl, sockfd);
if (argc != 3) if (argc != 3)
CyaSSL_check_domain_name(ssl, "www.yassl.com"); CyaSSL_check_domain_name(ssl, "www.yassl.com");
#ifdef NON_BLOCKING #ifdef NON_BLOCKING
@@ -197,10 +197,10 @@ void client_test(void* args)
NonBlockingSSL_Connect(ssl); NonBlockingSSL_Connect(ssl);
#else #else
#ifndef CYASSL_CALLBACKS #ifndef CYASSL_CALLBACKS
if (SSL_connect(ssl) != SSL_SUCCESS) { /* see note at top of README */ if (CyaSSL_connect(ssl) != SSL_SUCCESS) {/* see note at top of README */
int err = SSL_get_error(ssl, 0); int err = CyaSSL_get_error(ssl, 0);
char buffer[80]; char buffer[80];
printf("err = %d, %s\n", err, ERR_error_string(err, buffer)); printf("err = %d, %s\n", err, CyaSSL_ERR_error_string(err, buffer));
err_sys("SSL_connect failed");/* if you're getting an error here */ err_sys("SSL_connect failed");/* if you're getting an error here */
} }
#else #else
@@ -216,17 +216,17 @@ void client_test(void* args)
msgSz = 28; msgSz = 28;
strncpy(msg, "GET /index.html HTTP/1.0\r\n\r\n", msgSz); strncpy(msg, "GET /index.html HTTP/1.0\r\n\r\n", msgSz);
} }
if (SSL_write(ssl, msg, msgSz) != msgSz) if (CyaSSL_write(ssl, msg, msgSz) != msgSz)
err_sys("SSL_write failed"); err_sys("SSL_write failed");
input = SSL_read(ssl, reply, sizeof(reply)); input = CyaSSL_read(ssl, reply, sizeof(reply));
if (input > 0) { if (input > 0) {
reply[input] = 0; reply[input] = 0;
printf("Server response: %s\n", reply); printf("Server response: %s\n", reply);
if (argc == 3) { /* get html */ if (argc == 3) { /* get html */
while (1) { while (1) {
input = SSL_read(ssl, reply, sizeof(reply)); input = CyaSSL_read(ssl, reply, sizeof(reply));
if (input > 0) { if (input > 0) {
reply[input] = 0; reply[input] = 0;
printf("%s\n", reply); printf("%s\n", reply);
@@ -242,14 +242,14 @@ void client_test(void* args)
strncpy(msg, "break", 6); strncpy(msg, "break", 6);
msgSz = (int)strlen(msg); msgSz = (int)strlen(msg);
/* try to send session close */ /* try to send session close */
SSL_write(ssl, msg, msgSz); CyaSSL_write(ssl, msg, msgSz);
#endif #endif
session = SSL_get_session(ssl); session = CyaSSL_get_session(ssl);
sslResume = SSL_new(ctx); sslResume = CyaSSL_new(ctx);
#endif #endif
SSL_shutdown(ssl); CyaSSL_shutdown(ssl);
SSL_free(ssl); CyaSSL_free(ssl);
CloseSocket(sockfd); CloseSocket(sockfd);
#ifdef TEST_RESUME #ifdef TEST_RESUME
@@ -264,36 +264,36 @@ void client_test(void* args)
tcp_connect(&sockfd, argv[1], (short)atoi(argv[2])); tcp_connect(&sockfd, argv[1], (short)atoi(argv[2]));
else else
tcp_connect(&sockfd, yasslIP, yasslPort); tcp_connect(&sockfd, yasslIP, yasslPort);
SSL_set_fd(sslResume, sockfd); CyaSSL_set_fd(sslResume, sockfd);
SSL_set_session(sslResume, session); CyaSSL_set_session(sslResume, session);
showPeer(sslResume); showPeer(sslResume);
if (SSL_connect(sslResume) != SSL_SUCCESS) err_sys("SSL resume failed"); if (CyaSSL_connect(sslResume) != SSL_SUCCESS) err_sys("SSL resume failed");
#ifdef OPENSSL_EXTRA #ifdef OPENSSL_EXTRA
if (SSL_session_reused(sslResume)) if (CyaSSL_session_reused(sslResume))
printf("reused session id\n"); printf("reused session id\n");
else else
printf("didn't reuse session id!!!\n"); printf("didn't reuse session id!!!\n");
#endif #endif
if (SSL_write(sslResume, resumeMsg, resumeSz) != resumeSz) if (CyaSSL_write(sslResume, resumeMsg, resumeSz) != resumeSz)
err_sys("SSL_write failed"); err_sys("SSL_write failed");
input = SSL_read(sslResume, reply, sizeof(reply)); input = CyaSSL_read(sslResume, reply, sizeof(reply));
if (input > 0) { if (input > 0) {
reply[input] = 0; reply[input] = 0;
printf("Server resume response: %s\n", reply); printf("Server resume response: %s\n", reply);
} }
/* try to send session break */ /* try to send session break */
SSL_write(sslResume, msg, msgSz); CyaSSL_write(sslResume, msg, msgSz);
SSL_shutdown(sslResume); CyaSSL_shutdown(sslResume);
SSL_free(sslResume); CyaSSL_free(sslResume);
#endif /* TEST_RESUME */ #endif /* TEST_RESUME */
SSL_CTX_free(ctx); CyaSSL_CTX_free(ctx);
CloseSocket(sockfd); CloseSocket(sockfd);
((func_args*)args)->return_code = 0; ((func_args*)args)->return_code = 0;

View File

@@ -23,7 +23,7 @@
#include <config.h> #include <config.h>
#endif #endif
#include <cyassl/openssl/ssl.h> #include <cyassl/ssl.h>
#include <cyassl/test.h> #include <cyassl/test.h>
#ifndef NO_MAIN_DRIVER #ifndef NO_MAIN_DRIVER
@@ -53,8 +53,8 @@ static void SignalReady(void* args)
THREAD_RETURN CYASSL_THREAD echoserver_test(void* args) THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
{ {
SOCKET_T sockfd = 0; SOCKET_T sockfd = 0;
SSL_METHOD* method = 0; CYASSL_METHOD* method = 0;
SSL_CTX* ctx = 0; CYASSL_CTX* ctx = 0;
int outCreated = 0; int outCreated = 0;
int shutdown = 0; int shutdown = 0;
@@ -75,23 +75,23 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
tcp_listen(&sockfd); tcp_listen(&sockfd);
#if defined(CYASSL_DTLS) #if defined(CYASSL_DTLS)
method = DTLSv1_server_method(); method = CyaDTLSv1_server_method();
#elif !defined(NO_TLS) #elif !defined(NO_TLS)
method = SSLv23_server_method(); method = CyaSSLv23_server_method();
#else #else
method = SSLv3_server_method(); method = CyaSSLv3_server_method();
#endif #endif
ctx = SSL_CTX_new(method); ctx = CyaSSL_CTX_new(method);
/* SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF); */ /* CyaSSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF); */
#ifdef OPENSSL_EXTRA #ifdef OPENSSL_EXTRA
SSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack); CyaSSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack);
#endif #endif
#ifndef NO_FILESYSTEM #ifndef NO_FILESYSTEM
#ifdef HAVE_NTRU #ifdef HAVE_NTRU
/* ntru */ /* ntru */
if (SSL_CTX_use_certificate_file(ctx, ntruCert, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_certificate_file(ctx, ntruCert, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load ntru cert file, " err_sys("can't load ntru cert file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
@@ -102,23 +102,23 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
#elif HAVE_ECC #elif HAVE_ECC
/* ecc */ /* ecc */
if (SSL_CTX_use_certificate_file(ctx, eccCert, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_certificate_file(ctx, eccCert, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load server cert file, " err_sys("can't load server cert file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
if (SSL_CTX_use_PrivateKey_file(ctx, eccKey, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_PrivateKey_file(ctx, eccKey, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load server key file, " err_sys("can't load server key file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
#else #else
/* normal */ /* normal */
if (SSL_CTX_use_certificate_file(ctx, svrCert, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_certificate_file(ctx, svrCert, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load server cert file, " err_sys("can't load server cert file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
if (SSL_CTX_use_PrivateKey_file(ctx, svrKey, SSL_FILETYPE_PEM) if (CyaSSL_CTX_use_PrivateKey_file(ctx, svrKey, SSL_FILETYPE_PEM)
!= SSL_SUCCESS) != SSL_SUCCESS)
err_sys("can't load server key file, " err_sys("can't load server key file, "
"Please run from CyaSSL home dir"); "Please run from CyaSSL home dir");
@@ -131,7 +131,7 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
SignalReady(args); SignalReady(args);
while (!shutdown) { while (!shutdown) {
SSL* ssl = 0; CYASSL* ssl = 0;
char command[1024]; char command[1024];
int echoSz = 0; int echoSz = 0;
int clientfd; int clientfd;
@@ -146,17 +146,17 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
#endif #endif
if (clientfd == -1) err_sys("tcp accept failed"); if (clientfd == -1) err_sys("tcp accept failed");
ssl = SSL_new(ctx); ssl = CyaSSL_new(ctx);
if (ssl == NULL) err_sys("SSL_new failed"); if (ssl == NULL) err_sys("SSL_new failed");
SSL_set_fd(ssl, clientfd); CyaSSL_set_fd(ssl, clientfd);
#if !defined(NO_FILESYSTEM) && defined(OPENSSL_EXTRA) #if !defined(NO_FILESYSTEM) && defined(OPENSSL_EXTRA)
CyaSSL_SetTmpDH_file(ssl, dhParam, SSL_FILETYPE_PEM); CyaSSL_SetTmpDH_file(ssl, dhParam, SSL_FILETYPE_PEM);
#else #else
SetDH(ssl); /* will repick suites with DHE, higher than PSK */ SetDH(ssl); /* will repick suites with DHE, higher than PSK */
#endif #endif
if (SSL_accept(ssl) != SSL_SUCCESS) { if (CyaSSL_accept(ssl) != SSL_SUCCESS) {
printf("SSL_accept failed\n"); printf("SSL_accept failed\n");
SSL_free(ssl); CyaSSL_free(ssl);
CloseSocket(clientfd); CloseSocket(clientfd);
continue; continue;
} }
@@ -164,7 +164,7 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
showPeer(ssl); showPeer(ssl);
#endif #endif
while ( (echoSz = SSL_read(ssl, command, sizeof(command))) > 0) { while ( (echoSz = CyaSSL_read(ssl, command, sizeof(command))) > 0) {
if ( strncmp(command, "quit", 4) == 0) { if ( strncmp(command, "quit", 4) == 0) {
printf("client sent quit command: shutting down!\n"); printf("client sent quit command: shutting down!\n");
@@ -198,7 +198,7 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
strncpy(&command[echoSz], footer, sizeof(footer)); strncpy(&command[echoSz], footer, sizeof(footer));
echoSz += sizeof(footer); echoSz += sizeof(footer);
if (SSL_write(ssl, command, echoSz) != echoSz) if (CyaSSL_write(ssl, command, echoSz) != echoSz)
err_sys("SSL_write failed"); err_sys("SSL_write failed");
break; break;
} }
@@ -208,13 +208,13 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
fputs(command, fout); fputs(command, fout);
#endif #endif
if (SSL_write(ssl, command, echoSz) != echoSz) if (CyaSSL_write(ssl, command, echoSz) != echoSz)
err_sys("SSL_write failed"); err_sys("SSL_write failed");
} }
#ifndef CYASSL_DTLS #ifndef CYASSL_DTLS
SSL_shutdown(ssl); CyaSSL_shutdown(ssl);
#endif #endif
SSL_free(ssl); CyaSSL_free(ssl);
CloseSocket(clientfd); CloseSocket(clientfd);
#ifdef CYASSL_DTLS #ifdef CYASSL_DTLS
tcp_listen(&sockfd); tcp_listen(&sockfd);
@@ -223,7 +223,7 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
} }
CloseSocket(sockfd); CloseSocket(sockfd);
SSL_CTX_free(ctx); CyaSSL_CTX_free(ctx);
#ifdef ECHO_OUT #ifdef ECHO_OUT
if (outCreated) if (outCreated)