mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-27 07:02:20 +01:00
Add support for X25519 and X448 based hybrid PQC + ECC key exchange groups. Furthermore, two new combinations with SECP curves are added to match OQS combinations. This also incorporates the changed order of X25519 and X448 based combinations to place the PQC material before the ECDH material. This is motivated by the necessity to always have material of a FIPS approved algorithm first. Also, codepoints are updated to reflect the latest draft standards for pure ML-KEM and some of the hybrids. With these changes and based on the recent additions to both enable ML-KEM final and draft versions simultaneously, a WolfSSL TLS server is now compatible with all recent browsers that support either the draft version of ML-KEM (Chromium based browsers and Firefox < version 132; only when the draft version is enabled in the build) or the final version already (Firefox > version 132). In the process of extending support, some code and logic cleanup happened. Furthermore, some memory leaks within the hybrid code path have been fixed. Signed-off-by: Tobias Frauenschläger <tobias.frauenschlaeger@oth-regensburg.de>
4939 lines
165 KiB
C
4939 lines
165 KiB
C
/* client.c
|
||
*
|
||
* Copyright (C) 2006-2025 wolfSSL Inc.
|
||
*
|
||
* This file is part of wolfSSL.
|
||
*
|
||
* wolfSSL is free software; you can redistribute it and/or modify
|
||
* it under the terms of the GNU General Public License as published by
|
||
* the Free Software Foundation; either version 2 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* wolfSSL is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU General Public License
|
||
* along with this program; if not, write to the Free Software
|
||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||
*/
|
||
|
||
/* For simpler wolfSSL TLS client examples, visit
|
||
* https://github.com/wolfSSL/wolfssl-examples/tree/master/tls
|
||
*/
|
||
|
||
#ifdef HAVE_CONFIG_H
|
||
#include <config.h>
|
||
#endif
|
||
|
||
#ifndef WOLFSSL_USER_SETTINGS
|
||
#include <wolfssl/options.h>
|
||
#endif
|
||
#include <wolfssl/wolfcrypt/settings.h>
|
||
|
||
#undef TEST_OPENSSL_COEXIST /* can't use this option with this example */
|
||
#undef OPENSSL_COEXIST /* can't use this option with this example */
|
||
|
||
#include <wolfssl/ssl.h>
|
||
|
||
#ifdef WOLFSSL_WOLFSENTRY_HOOKS
|
||
#include <wolfsentry/wolfsentry.h>
|
||
#if !defined(NO_FILESYSTEM) && !defined(WOLFSENTRY_NO_JSON)
|
||
static const char *wolfsentry_config_path = NULL;
|
||
#endif
|
||
#endif /* WOLFSSL_WOLFSENTRY_HOOKS */
|
||
|
||
#if defined(WOLFSSL_MDK_ARM) || defined(WOLFSSL_KEIL_TCP_NET)
|
||
#include <stdio.h>
|
||
#include <string.h>
|
||
#include "rl_fs.h"
|
||
#include "rl_net.h"
|
||
#endif
|
||
|
||
#include <wolfssl/test.h>
|
||
|
||
#include <examples/client/client.h>
|
||
#include <wolfssl/error-ssl.h>
|
||
|
||
#if !defined(NO_WOLFSSL_CLIENT) && !defined(NO_TLS)
|
||
|
||
|
||
#ifdef NO_FILESYSTEM
|
||
#ifdef NO_RSA
|
||
#error currently the example only tries to load in a RSA buffer
|
||
#endif
|
||
#undef USE_CERT_BUFFERS_256
|
||
#define USE_CERT_BUFFERS_256
|
||
#undef USE_CERT_BUFFERS_2048
|
||
#define USE_CERT_BUFFERS_2048
|
||
#include <wolfssl/certs_test.h>
|
||
#endif
|
||
|
||
#include <wolfssl/wolfcrypt/wolfmath.h> /* for max bits */
|
||
|
||
#ifdef HAVE_ECC
|
||
#include <wolfssl/wolfcrypt/ecc.h>
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
static int devId = INVALID_DEVID;
|
||
#endif
|
||
|
||
#define DEFAULT_TIMEOUT_SEC 2
|
||
#ifndef MAX_NON_BLOCK_SEC
|
||
#define MAX_NON_BLOCK_SEC 10
|
||
#endif
|
||
|
||
#define OCSP_STAPLING 1
|
||
#define OCSP_STAPLINGV2 2
|
||
#define OCSP_STAPLINGV2_MULTI 3
|
||
#define OCSP_STAPLING_OPT_MAX OCSP_STAPLINGV2_MULTI
|
||
|
||
#ifdef WOLFSSL_ALT_TEST_STRINGS
|
||
#define TEST_STR_TERM "\n"
|
||
#else
|
||
#define TEST_STR_TERM
|
||
#endif
|
||
|
||
static const char kHelloMsg[] = "hello wolfssl!" TEST_STR_TERM;
|
||
#ifndef NO_SESSION_CACHE
|
||
static const char kResumeMsg[] = "resuming wolfssl!" TEST_STR_TERM;
|
||
#endif
|
||
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_EARLY_DATA)
|
||
static const char kEarlyMsg[] = "A drop of info" TEST_STR_TERM;
|
||
#endif
|
||
static const char kHttpGetMsg[] = "GET /index.html HTTP/1.0\r\n\r\n";
|
||
|
||
/* Write needs to be largest of the above strings (29) */
|
||
#define CLI_MSG_SZ 32
|
||
/* Read needs to be at least sizeof server.c `webServerMsg` (226) */
|
||
#define CLI_REPLY_SZ 256
|
||
|
||
#if defined(XSLEEP_US) && defined(NO_MAIN_DRIVER)
|
||
/* This is to force the server's thread to get a chance to
|
||
* execute before continuing the resume in non-blocking
|
||
* DTLS test cases. */
|
||
#define TEST_DELAY() XSLEEP_US(10000)
|
||
#else
|
||
#define TEST_DELAY() XSLEEP_MS(1000)
|
||
#endif
|
||
|
||
/* Note on using port 0: the client standalone example doesn't utilize the
|
||
* port 0 port sharing; that is used by (1) the server in external control
|
||
* test mode and (2) the testsuite which uses this code and sets up the correct
|
||
* port numbers when the internal thread using the server code using port 0. */
|
||
|
||
static int lng_index = 0;
|
||
#ifdef WOLFSSL_CALLBACKS
|
||
WOLFSSL_TIMEVAL timeoutConnect;
|
||
static int handShakeCB(HandShakeInfo* info)
|
||
{
|
||
(void)info;
|
||
return 0;
|
||
}
|
||
|
||
static int timeoutCB(TimeoutInfo* info)
|
||
{
|
||
(void)info;
|
||
return 0;
|
||
}
|
||
|
||
#endif
|
||
|
||
static int quieter = 0; /* Print fewer messages. This is helpful with overly
|
||
* ambitious log parsers. */
|
||
|
||
#define LOG_ERROR(...) \
|
||
do { \
|
||
if (!quieter) \
|
||
fprintf(stderr, __VA_ARGS__); \
|
||
} while(0)
|
||
|
||
#ifdef HAVE_SESSION_TICKET
|
||
|
||
#ifndef SESSION_TICKET_LEN
|
||
#define SESSION_TICKET_LEN 256
|
||
#endif
|
||
static int sessionTicketCB(WOLFSSL* ssl,
|
||
const unsigned char* ticket, int ticketSz,
|
||
void* ctx)
|
||
{
|
||
(void)ssl;
|
||
(void)ticket;
|
||
printf("Session Ticket CB: ticketSz = %d, ctx = %s\n",
|
||
ticketSz, (char*)ctx);
|
||
return 0;
|
||
}
|
||
#endif
|
||
|
||
static int NonBlockingSSL_Connect(WOLFSSL* ssl)
|
||
{
|
||
int ret;
|
||
int error;
|
||
SOCKET_T sockfd;
|
||
int select_ret = 0;
|
||
int elapsedSec = 0;
|
||
|
||
#ifndef WOLFSSL_CALLBACKS
|
||
ret = wolfSSL_connect(ssl);
|
||
#else
|
||
ret = wolfSSL_connect_ex(ssl, handShakeCB, timeoutCB, timeoutConnect);
|
||
#endif
|
||
error = wolfSSL_get_error(ssl, 0);
|
||
sockfd = (SOCKET_T)wolfSSL_get_fd(ssl);
|
||
|
||
while (ret != WOLFSSL_SUCCESS &&
|
||
(error == WOLFSSL_ERROR_WANT_READ || error == WOLFSSL_ERROR_WANT_WRITE
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
|| error == WC_NO_ERR_TRACE(WC_PENDING_E)
|
||
#endif
|
||
#ifdef WOLFSSL_NONBLOCK_OCSP
|
||
|| error == WC_NO_ERR_TRACE(OCSP_WANT_READ)
|
||
#endif
|
||
)) {
|
||
int currTimeout = 1;
|
||
|
||
if (error == WOLFSSL_ERROR_WANT_READ)
|
||
printf("... client would read block\n");
|
||
else if (error == WOLFSSL_ERROR_WANT_WRITE)
|
||
printf("... client would write block\n");
|
||
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (error == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
else
|
||
#endif
|
||
{
|
||
if (error == WOLFSSL_ERROR_WANT_WRITE) {
|
||
select_ret = tcp_select_tx(sockfd, currTimeout);
|
||
|
||
}
|
||
else
|
||
{
|
||
#ifdef WOLFSSL_DTLS
|
||
if (wolfSSL_dtls(ssl))
|
||
currTimeout = wolfSSL_dtls_get_current_timeout(ssl);
|
||
#endif
|
||
select_ret = tcp_select(sockfd, currTimeout);
|
||
}
|
||
}
|
||
|
||
if ((select_ret == TEST_RECV_READY) || (select_ret == TEST_SEND_READY)
|
||
|| (select_ret == TEST_ERROR_READY)
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
|| error == WC_NO_ERR_TRACE(WC_PENDING_E)
|
||
#endif
|
||
#ifdef WOLFSSL_NONBLOCK_OCSP
|
||
|| error == WC_NO_ERR_TRACE(OCSP_WANT_READ)
|
||
#endif
|
||
) {
|
||
#ifndef WOLFSSL_CALLBACKS
|
||
ret = wolfSSL_connect(ssl);
|
||
#else
|
||
ret = wolfSSL_connect_ex(ssl, handShakeCB, timeoutCB,
|
||
timeoutConnect);
|
||
#endif
|
||
error = wolfSSL_get_error(ssl, 0);
|
||
elapsedSec = 0; /* reset elapsed */
|
||
}
|
||
else if (select_ret == TEST_TIMEOUT && !wolfSSL_dtls(ssl)) {
|
||
error = WOLFSSL_ERROR_WANT_READ;
|
||
|
||
elapsedSec += currTimeout;
|
||
if (elapsedSec > MAX_NON_BLOCK_SEC) {
|
||
printf("Nonblocking connect timeout\n");
|
||
error = WOLFSSL_FATAL_ERROR;
|
||
}
|
||
}
|
||
#ifdef WOLFSSL_DTLS
|
||
else if (select_ret == TEST_TIMEOUT && wolfSSL_dtls(ssl)) {
|
||
ret = wolfSSL_dtls_got_timeout(ssl);
|
||
if (ret != WOLFSSL_SUCCESS)
|
||
error = wolfSSL_get_error(ssl, ret);
|
||
else
|
||
error = WOLFSSL_ERROR_WANT_READ;
|
||
ret = WOLFSSL_FAILURE; /* Reset error so we loop */
|
||
}
|
||
#endif
|
||
else {
|
||
error = WOLFSSL_FATAL_ERROR;
|
||
}
|
||
}
|
||
|
||
return ret;
|
||
}
|
||
|
||
|
||
static void ShowCiphers(void)
|
||
{
|
||
static char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
|
||
int ret = wolfSSL_get_ciphers(ciphers, (int)sizeof(ciphers));
|
||
if (ret == WOLFSSL_SUCCESS) {
|
||
printf("%s\n", ciphers);
|
||
}
|
||
}
|
||
|
||
/* Shows which versions are valid */
|
||
static void ShowVersions(void)
|
||
{
|
||
char verStr[100];
|
||
XMEMSET(verStr, 0, sizeof(verStr));
|
||
#ifndef NO_OLD_TLS
|
||
#ifdef WOLFSSL_ALLOW_SSLV3
|
||
XSTRNCAT(verStr, "0:", 3);
|
||
#endif
|
||
#ifdef WOLFSSL_ALLOW_TLSV10
|
||
XSTRNCAT(verStr, "1:", 3);
|
||
#endif
|
||
XSTRNCAT(verStr, "2:", 3);
|
||
#endif /* NO_OLD_TLS */
|
||
#ifndef WOLFSSL_NO_TLS12
|
||
XSTRNCAT(verStr, "3:", 3);
|
||
#endif
|
||
#ifdef WOLFSSL_TLS13
|
||
XSTRNCAT(verStr, "4:", 3);
|
||
#endif
|
||
XSTRNCAT(verStr, "d(downgrade):", 14);
|
||
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
|
||
XSTRNCAT(verStr, "e(either):", 11);
|
||
#endif
|
||
/* print all strings at same time on stdout to avoid any flush issues */
|
||
printf("%s\n", verStr);
|
||
}
|
||
|
||
#if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
|
||
#define MAX_GROUP_NUMBER 4
|
||
static void SetKeyShare(WOLFSSL* ssl, int onlyKeyShare, int useX25519,
|
||
int useX448, int usePqc, char* pqcAlg, int setGroups)
|
||
{
|
||
int ret;
|
||
int groups[MAX_GROUP_NUMBER] = {0};
|
||
int count = 0;
|
||
|
||
(void)useX25519;
|
||
(void)useX448;
|
||
(void)usePqc;
|
||
(void)pqcAlg;
|
||
|
||
WOLFSSL_START(WC_FUNC_CLIENT_KEY_EXCHANGE_SEND);
|
||
if (onlyKeyShare == 0 || onlyKeyShare == 2) {
|
||
if (useX25519) {
|
||
#ifdef HAVE_CURVE25519
|
||
do {
|
||
ret = wolfSSL_UseKeyShare(ssl, WOLFSSL_ECC_X25519);
|
||
if (ret == WOLFSSL_SUCCESS)
|
||
groups[count++] = WOLFSSL_ECC_X25519;
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
else if (ret == WC_NO_ERR_TRACE(WC_PENDING_E))
|
||
wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
#endif
|
||
else
|
||
err_sys("unable to use curve x25519");
|
||
} while (ret == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
#endif
|
||
}
|
||
else if (useX448) {
|
||
#ifdef HAVE_CURVE448
|
||
do {
|
||
ret = wolfSSL_UseKeyShare(ssl, WOLFSSL_ECC_X448);
|
||
if (ret == WOLFSSL_SUCCESS)
|
||
groups[count++] = WOLFSSL_ECC_X448;
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
else if (ret == WC_NO_ERR_TRACE(WC_PENDING_E))
|
||
wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
#endif
|
||
else
|
||
err_sys("unable to use curve x448");
|
||
} while (ret == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
#endif
|
||
}
|
||
else {
|
||
#ifdef HAVE_ECC
|
||
#if !defined(NO_ECC256) || defined(HAVE_ALL_CURVES)
|
||
do {
|
||
ret = wolfSSL_UseKeyShare(ssl, WOLFSSL_ECC_SECP256R1);
|
||
if (ret == WOLFSSL_SUCCESS)
|
||
groups[count++] = WOLFSSL_ECC_SECP256R1;
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
else if (ret == WC_NO_ERR_TRACE(WC_PENDING_E))
|
||
wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
#endif
|
||
else
|
||
err_sys("unable to use curve secp256r1");
|
||
} while (ret == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
#endif
|
||
#ifdef WOLFSSL_SM2
|
||
do {
|
||
ret = wolfSSL_UseKeyShare(ssl, WOLFSSL_ECC_SM2P256V1);
|
||
if (ret == WOLFSSL_SUCCESS)
|
||
groups[count++] = WOLFSSL_ECC_SM2P256V1;
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
else if (ret == WC_NO_ERR_TRACE(WC_PENDING_E))
|
||
wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
#endif
|
||
else
|
||
err_sys("unable to use curve sm2p256v1");
|
||
} while (ret == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
#endif
|
||
#endif
|
||
}
|
||
}
|
||
if (onlyKeyShare == 0 || onlyKeyShare == 1) {
|
||
#ifdef HAVE_FFDHE_2048
|
||
do {
|
||
ret = wolfSSL_UseKeyShare(ssl, WOLFSSL_FFDHE_2048);
|
||
if (ret == WOLFSSL_SUCCESS)
|
||
groups[count++] = WOLFSSL_FFDHE_2048;
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
else if (ret == WC_NO_ERR_TRACE(WC_PENDING_E))
|
||
wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
#endif
|
||
else
|
||
err_sys("unable to use DH 2048-bit parameters");
|
||
} while (ret == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
#endif
|
||
}
|
||
#ifdef HAVE_PQC
|
||
if (onlyKeyShare == 0 || onlyKeyShare == 3) {
|
||
if (usePqc) {
|
||
int group = 0;
|
||
|
||
#ifndef WOLFSSL_NO_ML_KEM
|
||
#ifndef WOLFSSL_NO_ML_KEM_512
|
||
if (XSTRCMP(pqcAlg, "ML_KEM_512") == 0) {
|
||
group = WOLFSSL_ML_KEM_512;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_ML_KEM_768
|
||
if (XSTRCMP(pqcAlg, "ML_KEM_768") == 0) {
|
||
group = WOLFSSL_ML_KEM_768;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_ML_KEM_1024
|
||
if (XSTRCMP(pqcAlg, "ML_KEM_1024") == 0) {
|
||
group = WOLFSSL_ML_KEM_1024;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_ML_KEM_512
|
||
if (XSTRCMP(pqcAlg, "P256_ML_KEM_512") == 0) {
|
||
group = WOLFSSL_P256_ML_KEM_512;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_ML_KEM_768
|
||
if (XSTRCMP(pqcAlg, "P384_ML_KEM_768") == 0) {
|
||
group = WOLFSSL_P384_ML_KEM_768;
|
||
}
|
||
else if (XSTRCMP(pqcAlg, "P256_ML_KEM_768") == 0) {
|
||
group = WOLFSSL_P256_ML_KEM_768;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_ML_KEM_1024
|
||
if (XSTRCMP(pqcAlg, "P521_ML_KEM_1024") == 0) {
|
||
group = WOLFSSL_P521_ML_KEM_1024;
|
||
}
|
||
else if (XSTRCMP(pqcAlg, "P384_ML_KEM_1024") == 0) {
|
||
group = WOLFSSL_P384_ML_KEM_1024;
|
||
}
|
||
else
|
||
#endif
|
||
#if !defined(WOLFSSL_NO_ML_KEM_512) && defined(HAVE_CURVE25519)
|
||
if (XSTRCMP(pqcAlg, "X25519_ML_KEM_512") == 0) {
|
||
group = WOLFSSL_X25519_ML_KEM_512;
|
||
}
|
||
else
|
||
#endif
|
||
#if !defined(WOLFSSL_NO_ML_KEM_768) && defined(HAVE_CURVE25519)
|
||
if (XSTRCMP(pqcAlg, "X25519_ML_KEM_768") == 0) {
|
||
group = WOLFSSL_X25519_ML_KEM_768;
|
||
}
|
||
else
|
||
#endif
|
||
#if !defined(WOLFSSL_NO_ML_KEM_768) && defined(HAVE_CURVE448)
|
||
if (XSTRCMP(pqcAlg, "X448_ML_KEM_768") == 0) {
|
||
group = WOLFSSL_X448_ML_KEM_768;
|
||
}
|
||
else
|
||
#endif
|
||
#endif /* WOLFSSL_NO_ML_KEM */
|
||
#ifdef WOLFSSL_KYBER_ORIGINAL
|
||
#ifndef WOLFSSL_NO_KYBER512
|
||
if (XSTRCMP(pqcAlg, "KYBER_LEVEL1") == 0) {
|
||
group = WOLFSSL_KYBER_LEVEL1;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_KYBER768
|
||
if (XSTRCMP(pqcAlg, "KYBER_LEVEL3") == 0) {
|
||
group = WOLFSSL_KYBER_LEVEL3;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_KYBER1024
|
||
if (XSTRCMP(pqcAlg, "KYBER_LEVEL5") == 0) {
|
||
group = WOLFSSL_KYBER_LEVEL5;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_KYBER512
|
||
if (XSTRCMP(pqcAlg, "P256_KYBER_LEVEL1") == 0) {
|
||
group = WOLFSSL_P256_KYBER_LEVEL1;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_KYBER768
|
||
if (XSTRCMP(pqcAlg, "P384_KYBER_LEVEL3") == 0) {
|
||
group = WOLFSSL_P384_KYBER_LEVEL3;
|
||
}
|
||
else if (XSTRCMP(pqcAlg, "P256_KYBER_LEVEL3") == 0) {
|
||
group = WOLFSSL_P256_KYBER_LEVEL3;
|
||
}
|
||
else
|
||
#endif
|
||
#ifndef WOLFSSL_NO_KYBER1024
|
||
if (XSTRCMP(pqcAlg, "P521_KYBER_LEVEL5") == 0) {
|
||
group = WOLFSSL_P521_KYBER_LEVEL5;
|
||
}
|
||
else
|
||
#endif
|
||
#if !defined(WOLFSSL_NO_KYBER512) && defined(HAVE_CURVE25519)
|
||
if (XSTRCMP(pqcAlg, "X25519_KYBER_LEVEL1") == 0) {
|
||
group = WOLFSSL_X25519_KYBER_LEVEL1;
|
||
}
|
||
else
|
||
#endif
|
||
#if !defined(WOLFSSL_NO_KYBER768) && defined(HAVE_CURVE25519)
|
||
if (XSTRCMP(pqcAlg, "X25519_KYBER_LEVEL3") == 0) {
|
||
group = WOLFSSL_X25519_KYBER_LEVEL3;
|
||
}
|
||
else
|
||
#endif
|
||
#if !defined(WOLFSSL_NO_KYBER768) && defined(HAVE_CURVE448)
|
||
if (XSTRCMP(pqcAlg, "X448_KYBER_LEVEL3") == 0) {
|
||
group = WOLFSSL_X448_KYBER_LEVEL3;
|
||
}
|
||
else
|
||
#endif
|
||
#endif /* WOLFSSL_KYBER_ORIGINAL */
|
||
{
|
||
err_sys("invalid post-quantum KEM specified");
|
||
}
|
||
|
||
printf("Using Post-Quantum KEM: %s\n", pqcAlg);
|
||
if (wolfSSL_UseKeyShare(ssl, group) == WOLFSSL_SUCCESS) {
|
||
groups[count++] = group;
|
||
}
|
||
else {
|
||
err_sys("unable to use post-quantum KEM");
|
||
}
|
||
}
|
||
}
|
||
#endif
|
||
if (count >= MAX_GROUP_NUMBER)
|
||
err_sys("example group array size error");
|
||
if (setGroups && count > 0) {
|
||
if (wolfSSL_set_groups(ssl, groups, count) != WOLFSSL_SUCCESS)
|
||
err_sys("unable to set groups");
|
||
}
|
||
WOLFSSL_END(WC_FUNC_CLIENT_KEY_EXCHANGE_SEND);
|
||
}
|
||
#endif /* WOLFSSL_TLS13 && HAVE_SUPPORTED_CURVES */
|
||
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
static void EarlyData(WOLFSSL_CTX* ctx, WOLFSSL* ssl, const char* msg,
|
||
int msgSz, char* buffer)
|
||
{
|
||
int err;
|
||
int ret;
|
||
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_write_early_data(ssl, msg, msgSz, &msgSz);
|
||
if (ret <= 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
if (ret != msgSz) {
|
||
LOG_ERROR("SSL_write_early_data msg error %d, %s\n", err,
|
||
wolfSSL_ERR_error_string((unsigned long)err, buffer));
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("SSL_write_early_data failed");
|
||
}
|
||
}
|
||
#endif
|
||
|
||
/* Measures average time to create, connect and disconnect a connection (TPS).
|
||
Benchmark = number of connections. */
|
||
static const char* client_bench_conmsg[][5] = {
|
||
/* English */
|
||
{
|
||
"wolfSSL_resume avg took:", "milliseconds\n",
|
||
"wolfSSL_connect avg took:", "milliseconds\n",
|
||
NULL
|
||
},
|
||
#ifndef NO_MULTIBYTE_PRINT
|
||
/* Japanese */
|
||
{
|
||
"wolfSSL_resume 平均時間:", "ミリ秒\n",
|
||
"wolfSSL_connect 平均時間:", "ミリ秒\n",
|
||
}
|
||
#endif
|
||
};
|
||
|
||
static int ClientBenchmarkConnections(WOLFSSL_CTX* ctx, char* host, word16 port,
|
||
int dtlsUDP, int dtlsSCTP, int benchmark, int resumeSession, int useX25519,
|
||
int useX448, int usePqc, char* pqcAlg, int helloRetry, int onlyKeyShare,
|
||
int version, int earlyData)
|
||
{
|
||
/* time passed in number of connects give average */
|
||
int times = benchmark, skip = (int)((double)times * 0.1);
|
||
int loops = resumeSession ? 2 : 1;
|
||
int i = 0, err, ret;
|
||
#ifndef NO_SESSION_CACHE
|
||
WOLFSSL_SESSION* benchSession = NULL;
|
||
#endif
|
||
#ifdef WOLFSSL_TLS13
|
||
byte reply[CLI_REPLY_SZ];
|
||
#endif
|
||
const char** words = client_bench_conmsg[lng_index];
|
||
|
||
(void)resumeSession;
|
||
(void)useX25519;
|
||
(void)useX448;
|
||
(void)usePqc;
|
||
(void)pqcAlg;
|
||
(void)helloRetry;
|
||
(void)onlyKeyShare;
|
||
(void)version;
|
||
(void)earlyData;
|
||
|
||
while (loops--) {
|
||
#ifndef NO_SESSION_CACHE
|
||
int benchResume = resumeSession && loops == 0;
|
||
#endif
|
||
double start = current_time(1), avg;
|
||
|
||
for (i = 0; i < times; i++) {
|
||
SOCKET_T sockfd;
|
||
WOLFSSL* ssl;
|
||
|
||
if (i == skip)
|
||
start = current_time(1);
|
||
|
||
ssl = wolfSSL_new(ctx);
|
||
if (ssl == NULL)
|
||
err_sys("unable to get SSL object");
|
||
|
||
#ifndef NO_SESSION_CACHE
|
||
if (benchResume)
|
||
wolfSSL_set_session(ssl, benchSession);
|
||
#endif
|
||
#if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
|
||
else if (version >= 4) {
|
||
if (!helloRetry)
|
||
SetKeyShare(ssl, onlyKeyShare, useX25519, useX448,
|
||
usePqc, pqcAlg, 1);
|
||
else
|
||
wolfSSL_NoKeyShares(ssl);
|
||
}
|
||
#endif
|
||
|
||
tcp_connect(&sockfd, host, port, dtlsUDP, dtlsSCTP, ssl);
|
||
|
||
if (wolfSSL_set_fd(ssl, sockfd) != WOLFSSL_SUCCESS) {
|
||
err_sys("error in setting fd");
|
||
}
|
||
|
||
#if defined(WOLFSSL_TLS13) && !defined(NO_SESSION_CACHE) && \
|
||
defined(WOLFSSL_EARLY_DATA)
|
||
if (version >= 4 && benchResume && earlyData) {
|
||
char buffer[WOLFSSL_MAX_ERROR_SZ];
|
||
EarlyData(ctx, ssl, kEarlyMsg, sizeof(kEarlyMsg)-1, buffer);
|
||
}
|
||
#endif
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_connect(ssl);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
/* returns the number of polled items or <0 for error */
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
EarlyDataStatus(ssl);
|
||
#endif
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err_sys("SSL_connect failed");
|
||
}
|
||
|
||
#ifdef WOLFSSL_TLS13
|
||
#ifndef NO_SESSION_CACHE
|
||
if (version >= 4 && resumeSession && !benchResume)
|
||
#else
|
||
if (version >= 4 && resumeSession)
|
||
#endif
|
||
{
|
||
/* no null term */
|
||
if (wolfSSL_write(ssl, kHttpGetMsg, sizeof(kHttpGetMsg)-1) <= 0)
|
||
err_sys("SSL_write failed");
|
||
|
||
if (wolfSSL_read(ssl, reply, sizeof(reply)-1) <= 0)
|
||
err_sys("SSL_read failed");
|
||
}
|
||
#endif
|
||
|
||
|
||
wolfSSL_shutdown(ssl);
|
||
#ifndef NO_SESSION_CACHE
|
||
if (i == (times-1) && resumeSession) {
|
||
if (benchSession != NULL)
|
||
wolfSSL_SESSION_free(benchSession);
|
||
benchSession = wolfSSL_get1_session(ssl);
|
||
}
|
||
#endif
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
}
|
||
avg = current_time(0) - start;
|
||
avg /= (times - skip);
|
||
avg *= 1000; /* milliseconds */
|
||
#ifndef NO_SESSION_CACHE
|
||
if (benchResume)
|
||
printf("%s %8.3f %s\n", words[0],avg, words[1]);
|
||
else
|
||
#endif
|
||
printf("%s %8.3f %s\n", words[2],avg, words[3]);
|
||
|
||
WOLFSSL_TIME(times);
|
||
}
|
||
|
||
#ifndef NO_SESSION_CACHE
|
||
if (benchSession != NULL)
|
||
wolfSSL_SESSION_free(benchSession);
|
||
#endif
|
||
|
||
return EXIT_SUCCESS;
|
||
}
|
||
|
||
/* Measures throughput in mbps. Throughput = number of bytes */
|
||
static int ClientBenchmarkThroughput(WOLFSSL_CTX* ctx, char* host, word16 port,
|
||
int dtlsUDP, int dtlsSCTP, int block, size_t throughput, int useX25519,
|
||
int useX448, int usePqc, char* pqcAlg, int exitWithRet, int version,
|
||
int onlyKeyShare)
|
||
{
|
||
double start, conn_time = 0, tx_time = 0, rx_time = 0;
|
||
SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID;
|
||
WOLFSSL* ssl;
|
||
int ret = 0, err = 0;
|
||
|
||
start = current_time(1);
|
||
ssl = wolfSSL_new(ctx);
|
||
if (ssl == NULL)
|
||
err_sys("unable to get SSL object");
|
||
|
||
tcp_connect(&sockfd, host, port, dtlsUDP, dtlsSCTP, ssl);
|
||
if (wolfSSL_set_fd(ssl, sockfd) != WOLFSSL_SUCCESS) {
|
||
err_sys("error in setting fd");
|
||
}
|
||
|
||
(void)useX25519;
|
||
(void)useX448;
|
||
(void)usePqc;
|
||
(void)pqcAlg;
|
||
(void)version;
|
||
(void)onlyKeyShare;
|
||
#if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
|
||
if (version >= 4) {
|
||
SetKeyShare(ssl, onlyKeyShare, useX25519, useX448, usePqc,
|
||
pqcAlg, 1);
|
||
}
|
||
#endif
|
||
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_connect(ssl);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
if (ret == WOLFSSL_SUCCESS) {
|
||
/* Perform throughput test */
|
||
char *tx_buffer, *rx_buffer;
|
||
|
||
/* Record connection time */
|
||
conn_time = current_time(0) - start;
|
||
|
||
/* Allocate TX/RX buffers */
|
||
tx_buffer = (char*)XMALLOC((size_t)block, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
rx_buffer = (char*)XMALLOC((size_t)block, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
if (tx_buffer && rx_buffer) {
|
||
WC_RNG rng;
|
||
|
||
/* Startup the RNG */
|
||
#if !defined(HAVE_FIPS) && defined(WOLFSSL_ASYNC_CRYPT)
|
||
ret = wc_InitRng_ex(&rng, NULL, devId);
|
||
#else
|
||
ret = wc_InitRng(&rng);
|
||
#endif
|
||
if (ret == 0) {
|
||
size_t xfer_bytes;
|
||
|
||
/* Generate random data to send */
|
||
ret = wc_RNG_GenerateBlock(&rng, (byte*)tx_buffer, (word32)block);
|
||
wc_FreeRng(&rng);
|
||
if(ret != 0) {
|
||
err_sys("wc_RNG_GenerateBlock failed");
|
||
}
|
||
|
||
/* Perform TX and RX of bytes */
|
||
xfer_bytes = 0;
|
||
while (throughput > xfer_bytes) {
|
||
int len, rx_pos, select_ret;
|
||
|
||
/* Determine packet size */
|
||
len = (int)min((word32)block, (word32)(throughput - xfer_bytes));
|
||
|
||
/* Perform TX */
|
||
start = current_time(1);
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_write(ssl, tx_buffer, len);
|
||
if (ret <= 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
if (ret != len) {
|
||
LOG_ERROR("SSL_write bench error %d!\n", err);
|
||
if (!exitWithRet)
|
||
err_sys("SSL_write failed");
|
||
goto doExit;
|
||
}
|
||
tx_time += current_time(0) - start;
|
||
|
||
/* Perform RX */
|
||
select_ret = tcp_select(sockfd, DEFAULT_TIMEOUT_SEC);
|
||
if (select_ret == TEST_RECV_READY) {
|
||
start = current_time(1);
|
||
rx_pos = 0;
|
||
while (rx_pos < len) {
|
||
ret = wolfSSL_read(ssl, &rx_buffer[rx_pos],
|
||
len - rx_pos);
|
||
if (ret <= 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
else
|
||
#endif
|
||
if (err != WOLFSSL_ERROR_WANT_READ &&
|
||
err != WOLFSSL_ERROR_WANT_WRITE) {
|
||
LOG_ERROR("SSL_read bench error %d\n", err);
|
||
err_sys("SSL_read failed");
|
||
}
|
||
}
|
||
else {
|
||
rx_pos += ret;
|
||
}
|
||
}
|
||
rx_time += current_time(0) - start;
|
||
}
|
||
|
||
/* Compare TX and RX buffers */
|
||
if (XMEMCMP(tx_buffer, rx_buffer, (size_t)len) != 0) {
|
||
XFREE(tx_buffer, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
tx_buffer = NULL;
|
||
XFREE(rx_buffer, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
rx_buffer = NULL;
|
||
err_sys("Compare TX and RX buffers failed");
|
||
}
|
||
|
||
/* Update overall position */
|
||
xfer_bytes += (size_t)len;
|
||
}
|
||
}
|
||
else {
|
||
err_sys("wc_InitRng failed");
|
||
}
|
||
(void)rng; /* for WC_NO_RNG case */
|
||
}
|
||
else {
|
||
err_sys("Client buffer malloc failed");
|
||
}
|
||
doExit:
|
||
XFREE(tx_buffer, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
XFREE(rx_buffer, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
}
|
||
else {
|
||
err_sys("wolfSSL_connect failed");
|
||
}
|
||
|
||
wolfSSL_shutdown(ssl);
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
|
||
if (exitWithRet)
|
||
return err;
|
||
|
||
#if defined(__MINGW32__) || defined(_WIN32)
|
||
#define SIZE_FMT "%d"
|
||
#define SIZE_TYPE int
|
||
#else
|
||
#define SIZE_FMT "%zu"
|
||
#define SIZE_TYPE size_t
|
||
#endif
|
||
printf(
|
||
"wolfSSL Client Benchmark " SIZE_FMT " bytes\n"
|
||
"\tConnect %8.3f ms\n"
|
||
"\tTX %8.3f ms (%8.3f MBps)\n"
|
||
"\tRX %8.3f ms (%8.3f MBps)\n",
|
||
(SIZE_TYPE)throughput,
|
||
conn_time * 1000,
|
||
(double)tx_time * 1000, (double)throughput / tx_time / 1024 / 1024,
|
||
(double)rx_time * 1000, (double)throughput / rx_time / 1024 / 1024
|
||
);
|
||
|
||
return EXIT_SUCCESS;
|
||
}
|
||
|
||
const char* starttlsCmd[6] = {
|
||
"220",
|
||
"EHLO mail.example.com\r\n",
|
||
"250",
|
||
"STARTTLS\r\n",
|
||
"220",
|
||
"QUIT\r\n",
|
||
};
|
||
|
||
/* Initiates the STARTTLS command sequence over TCP */
|
||
static int StartTLS_Init(SOCKET_T* sockfd)
|
||
{
|
||
char tmpBuf[512];
|
||
|
||
if (sockfd == NULL)
|
||
return BAD_FUNC_ARG;
|
||
|
||
/* S: 220 <host> SMTP service ready */
|
||
XMEMSET(tmpBuf, 0, sizeof(tmpBuf));
|
||
if (recv(*sockfd, tmpBuf, sizeof(tmpBuf)-1, 0) < 0)
|
||
err_sys("failed to read STARTTLS command\n");
|
||
|
||
if ((!XSTRNCMP(tmpBuf, starttlsCmd[0], XSTRLEN(starttlsCmd[0]))) &&
|
||
(tmpBuf[XSTRLEN(starttlsCmd[0])] == ' ')) {
|
||
printf("%s\n", tmpBuf);
|
||
} else {
|
||
err_sys("incorrect STARTTLS command received");
|
||
}
|
||
|
||
/* C: EHLO mail.example.com */
|
||
if (send(*sockfd, starttlsCmd[1], (SIZE_TYPE)XSTRLEN(starttlsCmd[1]), 0) !=
|
||
(int)XSTRLEN(starttlsCmd[1]))
|
||
err_sys("failed to send STARTTLS EHLO command\n");
|
||
|
||
/* S: 250 <host> offers a warm hug of welcome */
|
||
XMEMSET(tmpBuf, 0, sizeof(tmpBuf));
|
||
if (recv(*sockfd, tmpBuf, sizeof(tmpBuf)-1, 0) < 0)
|
||
err_sys("failed to read STARTTLS command\n");
|
||
|
||
if ((!XSTRNCMP(tmpBuf, starttlsCmd[2], XSTRLEN(starttlsCmd[2]))) &&
|
||
(tmpBuf[XSTRLEN(starttlsCmd[2])] == '-')) {
|
||
printf("%s\n", tmpBuf);
|
||
} else {
|
||
err_sys("incorrect STARTTLS command received");
|
||
}
|
||
|
||
/* C: STARTTLS */
|
||
if (send(*sockfd, starttlsCmd[3], (SIZE_TYPE)XSTRLEN(starttlsCmd[3]), 0) !=
|
||
(int)XSTRLEN(starttlsCmd[3])) {
|
||
err_sys("failed to send STARTTLS command\n");
|
||
}
|
||
|
||
/* S: 220 Go ahead */
|
||
XMEMSET(tmpBuf, 0, sizeof(tmpBuf));
|
||
if (recv(*sockfd, tmpBuf, sizeof(tmpBuf)-1, 0) < 0)
|
||
err_sys("failed to read STARTTLS command\n");
|
||
tmpBuf[sizeof(tmpBuf)-1] = '\0';
|
||
|
||
if ((!XSTRNCMP(tmpBuf, starttlsCmd[4], XSTRLEN(starttlsCmd[4]))) &&
|
||
(tmpBuf[XSTRLEN(starttlsCmd[4])] == ' ')) {
|
||
printf("%s\n", tmpBuf);
|
||
} else {
|
||
err_sys("incorrect STARTTLS command received, expected 220");
|
||
}
|
||
|
||
return WOLFSSL_SUCCESS;
|
||
}
|
||
|
||
/* Closes down the SMTP connection */
|
||
static int SMTP_Shutdown(WOLFSSL* ssl, int wc_shutdown)
|
||
{
|
||
int ret, err = 0;
|
||
char tmpBuf[256];
|
||
|
||
if (ssl == NULL)
|
||
return BAD_FUNC_ARG;
|
||
|
||
printf("\nwolfSSL client shutting down SMTP connection\n");
|
||
|
||
XMEMSET(tmpBuf, 0, sizeof(tmpBuf));
|
||
|
||
/* C: QUIT */
|
||
do {
|
||
ret = wolfSSL_write(ssl, starttlsCmd[5], (int)XSTRLEN(starttlsCmd[5]));
|
||
if (ret < 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
if (ret != (int)XSTRLEN(starttlsCmd[5])) {
|
||
err_sys("failed to send SMTP QUIT command\n");
|
||
}
|
||
|
||
/* S: 221 2.0.0 Service closing transmission channel */
|
||
do {
|
||
ret = wolfSSL_read(ssl, tmpBuf, sizeof(tmpBuf)-1);
|
||
if (ret < 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
if (ret < 0) {
|
||
err_sys("failed to read SMTP closing down response\n");
|
||
}
|
||
tmpBuf[ret] = 0; /* null terminate message */
|
||
printf("%s\n", tmpBuf);
|
||
|
||
ret = wolfSSL_shutdown(ssl);
|
||
if (wc_shutdown && ret == WOLFSSL_SHUTDOWN_NOT_DONE) {
|
||
if (tcp_select(wolfSSL_get_fd(ssl), DEFAULT_TIMEOUT_SEC) ==
|
||
TEST_RECV_READY) {
|
||
ret = wolfSSL_shutdown(ssl); /* bidirectional shutdown */
|
||
if (ret == WOLFSSL_SUCCESS)
|
||
printf("Bidirectional shutdown complete\n");
|
||
}
|
||
if (ret != WOLFSSL_SUCCESS)
|
||
LOG_ERROR("Bidirectional shutdown failed\n");
|
||
}
|
||
|
||
return WOLFSSL_SUCCESS;
|
||
}
|
||
|
||
static int ClientWrite(WOLFSSL* ssl, const char* msg, int msgSz, const char* str,
|
||
int exitWithRet)
|
||
{
|
||
int ret, err;
|
||
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_write(ssl, msg, msgSz);
|
||
if (ret <= 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WOLFSSL_ERROR_WANT_WRITE ||
|
||
err == WOLFSSL_ERROR_WANT_READ
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
|| err == WC_NO_ERR_TRACE(WC_PENDING_E)
|
||
#endif
|
||
);
|
||
if (ret != msgSz) {
|
||
char buffer[WOLFSSL_MAX_ERROR_SZ];
|
||
LOG_ERROR("SSL_write%s msg error %d, %s\n", str, err,
|
||
wolfSSL_ERR_error_string((unsigned long)err, buffer));
|
||
if (!exitWithRet) {
|
||
err_sys("SSL_write failed");
|
||
}
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
static int ClientRead(WOLFSSL* ssl, char* reply, int replyLen, int mustRead,
|
||
const char* str, int exitWithRet)
|
||
{
|
||
int ret, err;
|
||
char buffer[WOLFSSL_MAX_ERROR_SZ];
|
||
double start = current_time(1), elapsed;
|
||
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_read(ssl, reply, replyLen);
|
||
if (ret <= 0) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
else
|
||
#endif
|
||
if (err != WOLFSSL_ERROR_WANT_READ &&
|
||
err != WOLFSSL_ERROR_WANT_WRITE &&
|
||
err != WC_NO_ERR_TRACE(APP_DATA_READY))
|
||
{
|
||
LOG_ERROR("SSL_read reply error %d, %s\n", err,
|
||
wolfSSL_ERR_error_string((unsigned long)err, buffer));
|
||
if (!exitWithRet) {
|
||
err_sys("SSL_read failed");
|
||
}
|
||
else {
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
|
||
if (mustRead &&
|
||
(err == WOLFSSL_ERROR_WANT_READ
|
||
|| err == WOLFSSL_ERROR_WANT_WRITE)) {
|
||
elapsed = current_time(0) - start;
|
||
if (elapsed > MAX_NON_BLOCK_SEC) {
|
||
LOG_ERROR("Nonblocking read timeout\n");
|
||
ret = WOLFSSL_FATAL_ERROR;
|
||
break;
|
||
}
|
||
}
|
||
} while ((mustRead && err == WOLFSSL_ERROR_WANT_READ)
|
||
|| err == WOLFSSL_ERROR_WANT_WRITE
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
|| err == WC_NO_ERR_TRACE(WC_PENDING_E)
|
||
#endif
|
||
|| err == WC_NO_ERR_TRACE(APP_DATA_READY)
|
||
);
|
||
if (ret > 0) {
|
||
reply[ret] = 0; /* null terminate */
|
||
printf("%s%s\n", str, reply);
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
static int ClientWriteRead(WOLFSSL* ssl, const char* msg, int msgSz,
|
||
char* reply, int replyLen, int mustRead,
|
||
const char* str, int exitWithRet)
|
||
{
|
||
int ret = 0;
|
||
|
||
do {
|
||
ret = ClientWrite(ssl, msg, msgSz, str, exitWithRet);
|
||
if (ret != 0) {
|
||
if (!exitWithRet)
|
||
err_sys("ClientWrite failed");
|
||
else
|
||
break;
|
||
}
|
||
if (wolfSSL_dtls(ssl)) {
|
||
ret = tcp_select(wolfSSL_get_fd(ssl), DEFAULT_TIMEOUT_SEC);
|
||
if (ret == TEST_TIMEOUT) {
|
||
continue;
|
||
}
|
||
else if (ret == TEST_RECV_READY) {
|
||
/* Ready to read */
|
||
}
|
||
else {
|
||
LOG_ERROR("%s tcp_select error\n", str);
|
||
if (!exitWithRet)
|
||
err_sys("tcp_select failed");
|
||
else
|
||
ret = WOLFSSL_FATAL_ERROR;
|
||
break;
|
||
}
|
||
}
|
||
ret = ClientRead(ssl, reply, replyLen, mustRead, str, exitWithRet);
|
||
if (mustRead && ret != 0) {
|
||
if (!exitWithRet)
|
||
err_sys("ClientRead failed");
|
||
else
|
||
break;
|
||
}
|
||
break;
|
||
} while (1);
|
||
|
||
if (ret != 0) {
|
||
char buffer[WOLFSSL_MAX_ERROR_SZ];
|
||
LOG_ERROR("SSL_write%s msg error %d, %s\n", str, ret,
|
||
wolfSSL_ERR_error_string((unsigned long)ret, buffer));
|
||
}
|
||
|
||
return ret;
|
||
}
|
||
|
||
/* when adding new option, please follow the steps below: */
|
||
/* 1. add new option message in English section */
|
||
/* 2. increase the number of the second column */
|
||
/* 3. increase the array dimension */
|
||
/* 4. add the same message into Japanese section */
|
||
/* (will be translated later) */
|
||
/* 5. add printf() into suitable position of Usage() */
|
||
static const char* client_usage_msg[][78] = {
|
||
/* English */
|
||
{
|
||
" NOTE: All files relative to wolfSSL home dir\n", /* 0 */
|
||
"Max RSA key size in bits for build is set at : ", /* 1 */
|
||
#ifdef NO_RSA
|
||
"RSA not supported\n", /* 2 */
|
||
#elif defined(WOLFSSL_SP_MATH) /* case of SP math only */
|
||
#ifdef WOLFSSL_SP_4096
|
||
"4096\n", /* 2 */
|
||
#elif !defined(WOLFSSL_SP_NO_3072)
|
||
"3072\n", /* 2 */
|
||
#elif !defined(WOLFSSL_SP_NO_2048)
|
||
"2048\n", /* 2 */
|
||
#else
|
||
"0\n", /* 2 */
|
||
#endif
|
||
#elif defined(USE_FAST_MATH)
|
||
#else
|
||
"INFINITE\n", /* 2 */
|
||
#endif
|
||
"-? <num> Help, print this usage\n"
|
||
" 0: English, 1: Japanese\n"
|
||
"--help Help, in English\n", /* 3 */
|
||
"-h <host> Host to connect to, default", /* 4 */
|
||
"-p <num> Port to connect on, not 0, default", /* 5 */
|
||
|
||
#ifndef WOLFSSL_TLS13
|
||
"-v <num> SSL version [0-3], SSLv3(0) - TLS1.2(3)), default", /* 6 */
|
||
"-V Prints valid ssl version numbers"
|
||
", SSLv3(0) - TLS1.2(3)\n", /* 7 */
|
||
#else
|
||
"-v <num> SSL version [0-4], SSLv3(0) - TLS1.3(4)), default", /* 6 */
|
||
"-V Prints valid ssl version numbers,"
|
||
" SSLv3(0) - TLS1.3(4)\n", /* 7 */
|
||
#endif
|
||
"-l <str> Cipher suite list (: delimited)\n", /* 8 */
|
||
#ifndef NO_CERTS
|
||
"-c <file> Certificate file, default", /* 9 */
|
||
"-k <file> Key file, default", /* 10 */
|
||
"-A <file> Certificate Authority file, default", /* 11 */
|
||
#endif
|
||
#ifndef NO_DH
|
||
"-Z <num> Minimum DH key bits, default", /* 12 */
|
||
#endif
|
||
"-b <num> Benchmark <num> connections and print stats\n", /* 13 */
|
||
#ifdef HAVE_ALPN
|
||
"-L <str> Application-Layer Protocol"
|
||
" Negotiation ({C,F}:<list>)\n", /* 14 */
|
||
#endif
|
||
"-B <num> Benchmark throughput"
|
||
" using <num> bytes and print stats\n", /* 15 */
|
||
#ifndef NO_PSK
|
||
"-s Use pre Shared keys\n", /* 16 */
|
||
#endif
|
||
"-d Disable peer checks\n", /* 17 */
|
||
"-D Override Date Errors example\n", /* 18 */
|
||
"-e List Every cipher suite available, \n", /* 19 */
|
||
"-g Send server HTTP GET\n", /* 20 */
|
||
#ifdef WOLFSSL_DTLS
|
||
#ifndef WOLFSSL_DTLS13
|
||
"-u Use UDP DTLS, add -v 2 for DTLSv1, -v 3 for DTLSv1.2"
|
||
" (default)\n", /* 21 */
|
||
#else
|
||
"-u Use UDP DTLS, add -v 2 for DTLSv1, -v 3 for DTLSv1.2"
|
||
" (default), -v 4 for DTLSv1.3\n", /* 21 */
|
||
#endif /* !WOLFSSL_DTLS13 */
|
||
#endif
|
||
#ifdef WOLFSSL_SCTP
|
||
"-G Use SCTP DTLS,"
|
||
" add -v 2 for DTLSv1, -v 3 for DTLSv1.2 (default)\n", /* 22 */
|
||
#endif
|
||
#ifndef NO_CERTS
|
||
"-m Match domain name in cert\n", /* 23 */
|
||
#endif
|
||
"-N Use Non-blocking sockets\n", /* 24 */
|
||
#ifndef NO_SESSION_CACHE
|
||
"-r Resume session\n", /* 25 */
|
||
#endif
|
||
"-w Wait for bidirectional shutdown\n", /* 26 */
|
||
"-M <prot> Use STARTTLS, using <prot> protocol (smtp)\n", /* 27 */
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
"-R Allow Secure Renegotiation\n", /* 28 */
|
||
"-i <str> Force client Initiated Secure Renegotiation. If the\n"
|
||
" string 'scr-app-data' is passed in as the value and\n"
|
||
" Non-blocking sockets are enabled ('-N') then wolfSSL\n"
|
||
" sends a test message during the secure renegotiation.\n"
|
||
" The string parameter is optional.\n", /* 29 */
|
||
#endif
|
||
"-f Fewer packets/group messages\n", /* 30 */
|
||
#ifndef NO_CERTS
|
||
"-x Disable client cert/key loading\n", /* 31 */
|
||
#endif
|
||
"-X Driven by eXternal test case\n", /* 32 */
|
||
"-j Use verify callback override\n", /* 33 */
|
||
#ifdef SHOW_SIZES
|
||
"-z Print structure sizes\n", /* 34 */
|
||
#endif
|
||
#ifdef HAVE_SNI
|
||
"-S <str> Use Host Name Indication\n", /* 35 */
|
||
#endif
|
||
#ifdef HAVE_MAX_FRAGMENT
|
||
"-F <num> Use Maximum Fragment Length [1-6]\n", /* 36 */
|
||
#endif
|
||
#ifdef HAVE_TRUNCATED_HMAC
|
||
"-T Use Truncated HMAC\n", /* 37 */
|
||
#endif
|
||
#ifdef HAVE_EXTENDED_MASTER
|
||
"-n Disable Extended Master Secret\n", /* 38 */
|
||
#endif
|
||
#ifdef HAVE_OCSP
|
||
"-o Perform OCSP lookup on peer certificate\n", /* 39 */
|
||
"-O <url> Perform OCSP lookup using <url> as responder\n", /* 40 */
|
||
#endif
|
||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
||
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
|
||
"-W <num> Use OCSP Stapling (1 v1, 2 v2, 3 v2 multi)\n", /* 41 */
|
||
" With 'm' at end indicates MUST staple\n", /* 42 */
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_TLS_OCSP_MULTI)
|
||
" -W 1 -v 4, Perform multi OCSP stapling for TLS13\n",
|
||
/* 43 */
|
||
#endif
|
||
#endif
|
||
#if defined(ATOMIC_USER) && !defined(WOLFSSL_AEAD_ONLY)
|
||
"-U Atomic User Record Layer Callbacks\n", /* 44 */
|
||
#endif
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
"-P Public Key Callbacks\n", /* 45 */
|
||
#endif
|
||
#ifdef HAVE_ANON
|
||
"-a Anonymous client\n", /* 46 */
|
||
#endif
|
||
#ifdef HAVE_CRL
|
||
"-C Disable CRL\n", /* 47 */
|
||
#endif
|
||
#ifdef WOLFSSL_TRUST_PEER_CERT
|
||
"-E <file> Path to load trusted peer cert\n", /* 48 */
|
||
#endif
|
||
#ifdef HAVE_WNR
|
||
"-q <file> Whitewood config file, defaults\n", /* 49 */
|
||
#endif
|
||
"-H <arg> Internal tests"
|
||
" [defCipherList, exitWithRet, verifyFail, useSupCurve,\n"
|
||
" loadSSL, disallowETM]\n", /* 50 */
|
||
#ifdef WOLFSSL_TLS13
|
||
"-J Use HelloRetryRequest to choose group for KE\n", /* 51 */
|
||
"-K Key Exchange for PSK not using (EC)DHE\n", /* 52 */
|
||
"-I Update keys and IVs before sending data\n", /* 53 */
|
||
#ifndef NO_DH
|
||
"-y Key Share with FFDHE named groups only\n", /* 54 */
|
||
#endif
|
||
#ifdef HAVE_ECC
|
||
"-Y Key Share with ECC named groups only\n", /* 55 */
|
||
#endif
|
||
#endif /* WOLFSSL_TLS13 */
|
||
#ifdef HAVE_CURVE25519
|
||
"-t Use X25519 for key exchange\n", /* 56 */
|
||
#endif
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
|
||
"-Q Support requesting certificate post-handshake\n", /* 57 */
|
||
#endif
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
"-0 Early data sent to server (0-RTT handshake)\n", /* 58 */
|
||
#endif
|
||
#ifdef WOLFSSL_MULTICAST
|
||
"-3 <grpid> Multicast, grpid < 256\n", /* 59 */
|
||
#endif
|
||
"-1 <num> Display a result by specified language.\n"
|
||
" 0: English, 1: Japanese\n", /* 60 */
|
||
#if !defined(NO_DH) && !defined(HAVE_FIPS) && \
|
||
!defined(HAVE_SELFTEST) && !defined(WOLFSSL_OLD_PRIME_CHECK)
|
||
"-2 Disable DH Prime check\n", /* 61 */
|
||
#endif
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
"-4 Use resumption for renegotiation\n", /* 62 */
|
||
#endif
|
||
#ifdef HAVE_TRUSTED_CA
|
||
"-5 Use Trusted CA Key Indication\n", /* 63 */
|
||
#endif
|
||
"-6 Simulate WANT_WRITE errors on every other IO send\n", /* 64 */
|
||
#ifdef HAVE_CURVE448
|
||
"-8 Use X448 for key exchange\n", /* 65 */
|
||
#endif
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
"-9 Use hash dir look up for certificate loading\n"
|
||
" loading from <wolfSSL home>/certs folder\n"
|
||
" files in the folder would have the form \"hash.N\" file name\n"
|
||
" e.g symbolic link to the file at certs folder\n"
|
||
" ln -s ca-cert.pem `openssl x509 -in ca-cert.pem -hash -noout`.0\n",
|
||
/* 66 */
|
||
#endif
|
||
#if defined(WOLFSSL_WOLFSENTRY_HOOKS) && !defined(NO_FILESYSTEM) && \
|
||
!defined(WOLFSENTRY_NO_JSON)
|
||
"--wolfsentry-config <file> Path for JSON wolfSentry config\n",
|
||
/* 67 */
|
||
#endif
|
||
#ifndef WOLFSSL_TLS13
|
||
"-7 Set minimum downgrade protocol version [0-3] "
|
||
" SSLv3(0) - TLS1.2(3)\n",
|
||
#else
|
||
"-7 Set minimum downgrade protocol version [0-4] "
|
||
" SSLv3(0) - TLS1.3(4)\n", /* 68 */
|
||
#endif
|
||
#ifdef HAVE_PQC
|
||
"--pqc <alg> Key Share with specified post-quantum algorithm only:\n"
|
||
#ifndef WOLFSSL_NO_ML_KEM
|
||
" ML_KEM_512, ML_KEM_768, ML_KEM_1024, P256_ML_KEM_512,"
|
||
"\n"
|
||
" P384_ML_KEM_768, P256_ML_KEM_768, P521_ML_KEM_1024,\n"
|
||
" P384_ML_KEM_1024, X25519_ML_KEM_512, "
|
||
"X25519_ML_KEM_768,\n"
|
||
" X448_ML_KEM_768\n"
|
||
#endif
|
||
#ifdef WOLFSSL_KYBER_ORIGINAL
|
||
" KYBER_LEVEL1, KYBER_LEVEL3, KYBER_LEVEL5, "
|
||
"P256_KYBER_LEVEL1,\n"
|
||
" P384_KYBER_LEVEL3, P256_KYBER_LEVEL3, "
|
||
"P521_KYBER_LEVEL5,\n"
|
||
" X25519_KYBER_LEVEL1, X25519_KYBER_LEVEL3, "
|
||
"X448_KYBER_LEVEL3\n"
|
||
#endif
|
||
"",
|
||
/* 69 */
|
||
#endif
|
||
#ifdef WOLFSSL_SRTP
|
||
"--srtp <profile> (default is SRTP_AES128_CM_SHA1_80)\n", /* 70 */
|
||
#endif
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
"--sys-ca-certs Load system CA certs for server cert verification\n", /* 71 */
|
||
#endif
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
"--onlyPskDheKe Must use DHE key exchange with PSK\n", /* 72 */
|
||
#endif
|
||
#ifndef NO_PSK
|
||
"--openssl-psk Use TLS 1.3 PSK callback compatible with OpenSSL\n", /* 73 */
|
||
#endif
|
||
#ifdef HAVE_RPK
|
||
"--rpk Use RPK for the defined certificates\n", /* 74 */
|
||
#endif
|
||
"--files-are-der Specified files are in DER, not PEM format\n", /* 75 */
|
||
#ifdef WOLFSSL_SYS_CRYPTO_POLICY
|
||
"--crypto-policy <path to crypto policy file>\n", /* 76 */
|
||
#endif
|
||
"\n"
|
||
"For simpler wolfSSL TLS client examples, visit\n"
|
||
"https://github.com/wolfSSL/wolfssl-examples/tree/master/tls\n", /* 77 */
|
||
NULL,
|
||
},
|
||
#ifndef NO_MULTIBYTE_PRINT
|
||
/* Japanese */
|
||
{
|
||
" 注意 : 全てのファイルは wolfSSL ホーム・ディレクトリからの相対です。"
|
||
"\n", /* 0 */
|
||
"RSAの最大ビットは次のように設定されています: ", /* 1 */
|
||
#ifdef NO_RSA
|
||
"RSAはサポートされていません。\n", /* 2 */
|
||
#elif defined(WOLFSSL_SP_MATH) /* case of SP math only */
|
||
#ifndef WOLFSSL_SP_NO_3072
|
||
"3072\n", /* 2 */
|
||
#elif !defined(WOLFSSL_SP_NO_2048)
|
||
"2048\n", /* 2 */
|
||
#else
|
||
"0\n", /* 2 */
|
||
#endif
|
||
#elif defined(USE_FAST_MATH)
|
||
#else
|
||
"無限\n", /* 2 */
|
||
#endif
|
||
"-? <num> ヘルプ, 使い方を表示\n"
|
||
" 0: 英語、 1: 日本語\n"
|
||
"--ヘルプ 日本語で使い方を表示\n", /* 3 */
|
||
"-h <host> 接続先ホスト, 既定値", /* 4 */
|
||
"-p <num> 接続先ポート, 0は無効, 既定値", /* 5 */
|
||
|
||
#ifndef WOLFSSL_TLS13
|
||
"-v <num> SSL バージョン [0-3], SSLv3(0) - TLS1.2(3)),"
|
||
" 既定値", /* 6 */
|
||
"-V 有効な ssl バージョン番号を出力, SSLv3(0) -"
|
||
" TLS1.2(3)\n", /* 7 */
|
||
#else
|
||
"-v <num> SSL バージョン [0-4], SSLv3(0) - TLS1.3(4)),"
|
||
" 既定値", /* 6 */
|
||
"-V 有効な ssl バージョン番号を出力, SSLv3(0) -"
|
||
" TLS1.3(4)\n", /* 7 */
|
||
#endif
|
||
"-l <str> 暗号スイートリスト (区切り文字 :)\n", /* 8 */
|
||
#ifndef NO_CERTS
|
||
"-c <file> 証明書ファイル, 既定値", /* 9 */
|
||
"-k <file> 鍵ファイル, 既定値", /* 10 */
|
||
"-A <file> 認証局ファイル, 既定値", /* 11 */
|
||
#endif
|
||
#ifndef NO_DH
|
||
"-Z <num> 最小 DH 鍵 ビット, 既定値", /* 12 */
|
||
#endif
|
||
"-b <num> ベンチマーク <num> 接続及び結果出力する\n", /* 13 */
|
||
#ifdef HAVE_ALPN
|
||
"-L <str> アプリケーション層プロトコルネゴシエーションを行う"
|
||
" ({C,F}:<list>)\n", /* 14 */
|
||
#endif
|
||
"-B <num> <num> バイトを用いてのベンチマーク・スループット測定"
|
||
"と結果を出力する\n", /* 15 */
|
||
#ifndef NO_PSK
|
||
"-s 事前共有鍵を使用する\n", /* 16 */
|
||
#endif
|
||
"-d ピア確認を無効とする\n", /* 17 */
|
||
"-D 日付エラー用コールバック例の上書きを行う\n", /* 18 */
|
||
"-e 利用可能な全ての暗号スイートをリスト, \n", /* 19 */
|
||
"-g サーバーへ HTTP GET を送信\n", /* 20 */
|
||
#ifdef WOLFSSL_DTLS
|
||
"-u UDP DTLSを使用する。\n"
|
||
#ifndef WOLFSSL_DTLS13
|
||
" -v 2 を追加指定するとDTLSv1, "
|
||
"-v 3 を追加指定すると DTLSv1.2 (既定値)\n", /* 21 */
|
||
#else
|
||
" -v 2 を追加指定するとDTLSv1, "
|
||
"-v 3 を追加指定すると DTLSv1.2 (既定値),\n"
|
||
" -v 4 を追加指定すると DTLSv1.3\n", /* 21 */
|
||
#endif /* !WOLFSSL_DTLS13 */
|
||
#endif /* WOLFSSL_DTLS */
|
||
#ifdef WOLFSSL_SCTP
|
||
"-G SCTP DTLSを使用する。-v 2 を追加指定すると"
|
||
" DTLSv1, -v 3 を追加指定すると DTLSv1.2 (既定値)\n", /* 22 */
|
||
#endif
|
||
#ifndef NO_CERTS
|
||
"-m 証明書内のドメイン名一致を確認する\n", /* 23 */
|
||
#endif
|
||
"-N ノンブロッキング・ソケットを使用する\n", /* 24 */
|
||
#ifndef NO_SESSION_CACHE
|
||
"-r セッションを継続する\n", /* 25 */
|
||
#endif
|
||
"-w 双方向シャットダウンを待つ\n", /* 26 */
|
||
"-M <prot> STARTTLSを使用する, <prot>プロトコル(smtp)を"
|
||
"使用する\n", /* 27 */
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
"-R セキュアな再ネゴシエーションを許可する\n", /* 28 */
|
||
"-i <str> クライアント主導のネゴシエーションを強制する\n", /* 29 */
|
||
#endif
|
||
"-f より少ないパケット/グループメッセージを使用する\n",/* 30 */
|
||
#ifndef NO_CERTS
|
||
"-x クライアントの証明書/鍵のロードを無効する\n", /* 31 */
|
||
#endif
|
||
"-X 外部テスト・ケースにより動作する\n", /* 32 */
|
||
"-j コールバック・オーバーライドの検証を使用する\n", /* 33 */
|
||
#ifdef SHOW_SIZES
|
||
"-z 構造体のサイズを表示する\n", /* 34 */
|
||
#endif
|
||
#ifdef HAVE_SNI
|
||
"-S <str> ホスト名表示を使用する\n", /* 35 */
|
||
#endif
|
||
#ifdef HAVE_MAX_FRAGMENT
|
||
"-F <num> 最大フラグメント長[1-6]を設定する\n", /* 36 */
|
||
#endif
|
||
#ifdef HAVE_TRUNCATED_HMAC
|
||
"-T Truncated HMACを使用する\n", /* 37 */
|
||
#endif
|
||
#ifdef HAVE_EXTENDED_MASTER
|
||
"-n マスターシークレット拡張を無効にする\n", /* 38 */
|
||
#endif
|
||
#ifdef HAVE_OCSP
|
||
"-o OCSPルックアップをピア証明書で実施する\n", /* 39 */
|
||
"-O <url> OCSPルックアップを、<url>を使用し"
|
||
"応答者として実施する\n", /* 40 */
|
||
#endif
|
||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
||
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
|
||
"-W <num> OCSP Staplingを使用する"
|
||
" (1 v1, 2 v2, 3 v2 multi)\n", /* 41 */
|
||
" 'm' を最後に指定すると必ず staple を使用する\n" /* 42 */
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_TLS_OCSP_MULTI)
|
||
" -W 1 -v 4, "
|
||
"TLS13 使用時に複数(Multi)の OCSP を実施します\n" /* 43 */
|
||
#endif
|
||
#endif
|
||
#if defined(ATOMIC_USER) && !defined(WOLFSSL_AEAD_ONLY)
|
||
"-U アトミック・ユーザー記録の"
|
||
"コールバックを利用する\n", /* 44 */
|
||
#endif
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
"-P 公開鍵コールバック\n", /* 45 */
|
||
#endif
|
||
#ifdef HAVE_ANON
|
||
"-a 匿名クライアント\n", /* 46 */
|
||
#endif
|
||
#ifdef HAVE_CRL
|
||
"-C CRLを無効\n", /* 47 */
|
||
#endif
|
||
#ifdef WOLFSSL_TRUST_PEER_CERT
|
||
"-E <file> 信頼出来るピアの証明書ロードの為のパス\n", /* 48 */
|
||
#endif
|
||
#ifdef HAVE_WNR
|
||
"-q <file> Whitewood コンフィグファイル, 既定値\n", /* 49 */
|
||
#endif
|
||
"-H <arg> 内部テスト"
|
||
" [defCipherList, exitWithRet, verifyFail, useSupCurve,\n"
|
||
" loadSSL, disallowETM]\n", /* 50 */
|
||
#ifdef WOLFSSL_TLS13
|
||
"-J HelloRetryRequestをKEのグループ選択に使用する\n", /* 51 */
|
||
"-K 鍵交換にPSKを使用、(EC)DHEは使用しない\n", /* 52 */
|
||
"-I データ送信前に、鍵とIVを更新する\n", /* 53 */
|
||
#ifndef NO_DH
|
||
"-y FFDHE名前付きグループとの鍵共有のみ\n", /* 54 */
|
||
#endif
|
||
#ifdef HAVE_ECC
|
||
"-Y ECC名前付きグループとの鍵共有のみ\n", /* 55 */
|
||
#endif
|
||
#endif /* WOLFSSL_TLS13 */
|
||
#ifdef HAVE_CURVE25519
|
||
"-t X25519を鍵交換に使用する\n", /* 56 */
|
||
#endif
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
|
||
"-Q ポストハンドシェークの証明要求をサポートする\n", /* 57 */
|
||
#endif
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
"-0 Early data をサーバーへ送信する"
|
||
"(0-RTTハンドシェイク)\n", /* 58 */
|
||
#endif
|
||
#ifdef WOLFSSL_MULTICAST
|
||
"-3 <grpid> マルチキャスト, grpid < 256\n", /* 59 */
|
||
#endif
|
||
"-1 <num> 指定された言語で結果を表示します。\n"
|
||
" 0: 英語、 1: 日本語\n", /* 60 */
|
||
#if !defined(NO_DH) && !defined(HAVE_FIPS) && \
|
||
!defined(HAVE_SELFTEST) && !defined(WOLFSSL_OLD_PRIME_CHECK)
|
||
"-2 DHプライム番号チェックを無効にする\n", /* 61 */
|
||
#endif
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
"-4 再交渉に再開を使用\n", /* 62 */
|
||
#endif
|
||
#ifdef HAVE_TRUSTED_CA
|
||
"-5 信頼できる認証局の鍵表示を使用する\n", /* 63 */
|
||
#endif
|
||
"-6 WANT_WRITE エラーを全てのIO 送信でシミュレートします\n", /* 64 */
|
||
#ifdef HAVE_CURVE448
|
||
"-8 鍵交換に X448 を使用する\n", /* 65 */
|
||
#endif
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
"-9 証明書の読み込みに hash dir 機能を使用する\n"
|
||
" <wolfSSL home>/certs フォルダーからロードします\n"
|
||
" フォルダー中のファイルは、\"hash.N\"[N:0-9]名である必要があります\n"
|
||
" 以下の例ではca-cert.pemにシンボリックリンクを設定します\n"
|
||
" ln -s ca-cert.pem `openssl x509 -in ca-cert.pem -hash -noout`.0\n",
|
||
/* 66 */
|
||
#endif
|
||
#if defined(WOLFSSL_WOLFSENTRY_HOOKS) && !defined(NO_FILESYSTEM) && \
|
||
!defined(WOLFSENTRY_NO_JSON)
|
||
"--wolfsentry-config <file> wolfSentry コンフィグファイル\n",
|
||
/* 67 */
|
||
#endif
|
||
#ifndef WOLFSSL_TLS13
|
||
"-7 最小ダウングレード可能なプロトコルバージョンを設定します [0-3] "
|
||
" SSLv3(0) - TLS1.2(3)\n",
|
||
#else
|
||
"-7 最小ダウングレード可能なプロトコルバージョンを設定します [0-4] "
|
||
" SSLv3(0) - TLS1.3(4)\n", /* 68 */
|
||
#endif
|
||
#ifdef HAVE_PQC
|
||
"--pqc <alg> post-quantum 名前付きグループとの鍵共有のみ:\n"
|
||
#ifndef WOLFSSL_NO_ML_KEM
|
||
" ML_KEM_512, ML_KEM_768, ML_KEM_1024, P256_ML_KEM_512,"
|
||
"\n"
|
||
" P384_ML_KEM_768, P521_ML_KEM_1024\n"
|
||
#endif
|
||
#ifdef WOLFSSL_KYBER_ORIGINAL
|
||
" KYBER_LEVEL1, KYBER_LEVEL3, KYBER_LEVEL5, "
|
||
"P256_KYBER_LEVEL1,\n"
|
||
" P384_KYBER_LEVEL3, P521_KYBER_LEVEL5\n"
|
||
#endif
|
||
"",
|
||
/* 69 */
|
||
#endif
|
||
#ifdef WOLFSSL_SRTP
|
||
"--srtp <profile> (デフォルトは SRTP_AES128_CM_SHA1_80)\n", /* 70 */
|
||
#endif
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
"--sys-ca-certs Load system CA certs for server cert verification\n", /* 71 */
|
||
#endif
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
"--onlyPskDheKe Must use DHE key exchange with PSK\n", /* 72 */
|
||
#endif
|
||
#ifndef NO_PSK
|
||
"--openssl-psk Use TLS 1.3 PSK callback compatible with OpenSSL\n", /* 73 */
|
||
#endif
|
||
#ifdef HAVE_RPK
|
||
"--rpk Use RPK for the defined certificates\n", /* 74 */
|
||
#endif
|
||
"--files-are-der Specified files are in DER, not PEM format\n", /* 75 */
|
||
#ifdef WOLFSSL_SYS_CRYPTO_POLICY
|
||
"--crypto-policy <path to crypto policy file>\n", /* 76 */
|
||
#endif
|
||
"\n"
|
||
"より簡単なwolfSSL TLS クライアントの例については"
|
||
"下記にアクセスしてください\n"
|
||
"https://github.com/wolfSSL/wolfssl-examples/tree/master/tls\n", /* 77 */
|
||
NULL,
|
||
},
|
||
#endif
|
||
|
||
};
|
||
|
||
static void showPeerPEM(WOLFSSL* ssl)
|
||
{
|
||
#if defined(OPENSSL_ALL) && !defined(NO_BIO) && defined(WOLFSSL_CERT_GEN)
|
||
WOLFSSL_X509* peer = wolfSSL_get_peer_certificate(ssl);
|
||
if (peer) {
|
||
WOLFSSL_BIO* bioOut = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
|
||
if (bioOut == NULL) {
|
||
LOG_ERROR("failed to get bio on stdout\n");
|
||
}
|
||
else {
|
||
if (wolfSSL_BIO_set_fp(bioOut, stdout, BIO_NOCLOSE)
|
||
!= WOLFSSL_SUCCESS) {
|
||
LOG_ERROR("failed to set stdout to bio output\n");
|
||
wolfSSL_BIO_free(bioOut);
|
||
bioOut = NULL;
|
||
}
|
||
}
|
||
|
||
if (bioOut) {
|
||
wolfSSL_BIO_write(bioOut, "---\nServer certificate\n",
|
||
XSTRLEN("---\nServer certificate\n"));
|
||
wolfSSL_PEM_write_bio_X509(bioOut, peer);
|
||
}
|
||
wolfSSL_BIO_free(bioOut);
|
||
}
|
||
wolfSSL_FreeX509(peer);
|
||
#endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && !NO_BIO */
|
||
(void)ssl;
|
||
}
|
||
|
||
|
||
static void Usage(void)
|
||
{
|
||
int msgid = 0;
|
||
const char** msg = client_usage_msg[lng_index];
|
||
|
||
printf("%s%s%s", "wolfSSL client ", LIBWOLFSSL_VERSION_STRING,
|
||
msg[msgid]);
|
||
|
||
/* print out so that scripts can know what the max supported key size is */
|
||
printf("%s", msg[++msgid]);
|
||
#ifdef NO_RSA
|
||
printf("%s", msg[++msgid]);
|
||
#elif defined(WOLFSSL_SP_MATH) /* case of SP math only */
|
||
#ifndef WOLFSSL_SP_NO_3072
|
||
printf("%s", msg[++msgid]);
|
||
#elif !defined(WOLFSSL_SP_NO_2048)
|
||
printf("%s", msg[++msgid]);
|
||
#else
|
||
printf("%s", msg[++msgid]);
|
||
#endif
|
||
#elif defined(USE_FAST_MATH)
|
||
#if !defined(WOLFSSL_SP_MATH_ALL) && !defined(WOLFSSL_SP_MATH)
|
||
printf("%d\n", FP_MAX_BITS/2);
|
||
#else
|
||
printf("%d\n", SP_INT_MAX_BITS/2);
|
||
#endif
|
||
#else
|
||
/* normal math has unlimited max size */
|
||
printf("%s", msg[++msgid]);
|
||
#endif
|
||
|
||
printf("%s", msg[++msgid]); /* ? */
|
||
printf("%s %s\n", msg[++msgid], wolfSSLIP); /* -h */
|
||
printf("%s %d\n", msg[++msgid], wolfSSLPort); /* -p */
|
||
#ifndef WOLFSSL_TLS13
|
||
printf("%s %d\n", msg[++msgid], CLIENT_DEFAULT_VERSION); /* -v */
|
||
printf("%s", msg[++msgid]); /* -V */
|
||
#else
|
||
printf("%s %d\n", msg[++msgid], CLIENT_DEFAULT_VERSION); /* -v */
|
||
printf("%s", msg[++msgid]); /* -V */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -l */
|
||
#ifndef NO_CERTS
|
||
printf("%s %s\n", msg[++msgid], cliCertFile); /* -c */
|
||
printf("%s %s\n", msg[++msgid], cliKeyFile); /* -k */
|
||
printf("%s %s\n", msg[++msgid], caCertFile); /* -A */
|
||
#endif
|
||
#ifndef NO_DH
|
||
printf("%s %d\n", msg[++msgid], DEFAULT_MIN_DHKEY_BITS);
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -b */
|
||
#ifdef HAVE_ALPN
|
||
printf("%s", msg[++msgid]); /* -L <str> */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -B <num> */
|
||
#ifndef NO_PSK
|
||
printf("%s", msg[++msgid]); /* -s */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -d */
|
||
printf("%s", msg[++msgid]); /* -D */
|
||
printf("%s", msg[++msgid]); /* -e */
|
||
printf("%s", msg[++msgid]); /* -g */
|
||
#ifdef WOLFSSL_DTLS
|
||
printf("%s", msg[++msgid]); /* -u */
|
||
#endif
|
||
#ifdef WOLFSSL_SCTP
|
||
printf("%s", msg[++msgid]); /* -G */
|
||
#endif
|
||
#ifndef NO_CERTS
|
||
printf("%s", msg[++msgid]); /* -m */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -N */
|
||
#ifndef NO_SESSION_CACHE
|
||
printf("%s", msg[++msgid]); /* -r */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -w */
|
||
printf("%s", msg[++msgid]); /* -M */
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
printf("%s", msg[++msgid]); /* -R */
|
||
printf("%s", msg[++msgid]); /* -i */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -f */
|
||
#ifndef NO_CERTS
|
||
printf("%s", msg[++msgid]); /* -x */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -X */
|
||
printf("%s", msg[++msgid]); /* -j */
|
||
#ifdef SHOW_SIZES
|
||
printf("%s", msg[++msgid]); /* -z */
|
||
#endif
|
||
#ifdef HAVE_SNI
|
||
printf("%s", msg[++msgid]); /* -S */
|
||
#endif
|
||
#ifdef HAVE_MAX_FRAGMENT
|
||
printf("%s", msg[++msgid]); /* -F */
|
||
#endif
|
||
#ifdef HAVE_TRUNCATED_HMAC
|
||
printf("%s", msg[++msgid]); /* -T */
|
||
#endif
|
||
#ifdef HAVE_EXTENDED_MASTER
|
||
printf("%s", msg[++msgid]); /* -n */
|
||
#endif
|
||
#ifdef HAVE_OCSP
|
||
printf("%s", msg[++msgid]); /* -o */
|
||
printf("%s", msg[++msgid]); /* -O */
|
||
#endif
|
||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
||
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
|
||
printf("%s", msg[++msgid]); /* -W */
|
||
printf("%s", msg[++msgid]); /* note for -W */
|
||
#endif
|
||
#if defined(ATOMIC_USER) && !defined(WOLFSSL_AEAD_ONLY)
|
||
printf("%s", msg[++msgid]); /* -U */
|
||
#endif
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
printf("%s", msg[++msgid]); /* -P */
|
||
#endif
|
||
#ifdef HAVE_ANON
|
||
printf("%s", msg[++msgid]); /* -a */
|
||
#endif
|
||
#ifdef HAVE_CRL
|
||
printf("%s", msg[++msgid]); /* -C */
|
||
#endif
|
||
#ifdef WOLFSSL_TRUST_PEER_CERT
|
||
printf("%s", msg[++msgid]); /* -E */
|
||
#endif
|
||
#ifdef HAVE_WNR
|
||
printf("%s %s\n", msg[++msgid], wnrConfig); /* -q */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -H */
|
||
printf("%s", msg[++msgid]); /* more -H options */
|
||
#ifdef WOLFSSL_TLS13
|
||
printf("%s", msg[++msgid]); /* -J */
|
||
printf("%s", msg[++msgid]); /* -K */
|
||
printf("%s", msg[++msgid]); /* -I */
|
||
#ifndef NO_DH
|
||
printf("%s", msg[++msgid]); /* -y */
|
||
#endif
|
||
#ifdef HAVE_ECC
|
||
printf("%s", msg[++msgid]); /* -Y */
|
||
#endif
|
||
#endif /* WOLFSSL_TLS13 */
|
||
#ifdef HAVE_CURVE25519
|
||
printf("%s", msg[++msgid]); /* -t */
|
||
#endif
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
|
||
printf("%s", msg[++msgid]); /* -Q */
|
||
#endif
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
printf("%s", msg[++msgid]); /* -0 */
|
||
#endif
|
||
#ifdef WOLFSSL_MULTICAST
|
||
printf("%s", msg[++msgid]); /* -3 */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -1 */
|
||
#if !defined(NO_DH) && !defined(HAVE_FIPS) && \
|
||
!defined(HAVE_SELFTEST) && !defined(WOLFSSL_OLD_PRIME_CHECK)
|
||
printf("%s", msg[++msgid]); /* -2 */
|
||
#endif
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
printf("%s", msg[++msgid]); /* -4 */
|
||
#endif
|
||
#ifdef HAVE_TRUSTED_CA
|
||
printf("%s", msg[++msgid]); /* -5 */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -6 */
|
||
#ifdef HAVE_CURVE448
|
||
printf("%s", msg[++msgid]); /* -8 */
|
||
#endif
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
printf("%s", msg[++msgid]); /* -9 */
|
||
#endif
|
||
#if defined(WOLFSSL_WOLFSENTRY_HOOKS) && !defined(NO_FILESYSTEM) && \
|
||
!defined(WOLFSENTRY_NO_JSON)
|
||
printf("%s", msg[++msgid]); /* --wolfsentry-config */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* -7 */
|
||
#ifdef HAVE_PQC
|
||
printf("%s", msg[++msgid]); /* --pqc */
|
||
#endif
|
||
#ifdef WOLFSSL_SRTP
|
||
printf("%s", msg[++msgid]); /* dtls-srtp */
|
||
#endif
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
printf("%s", msg[++msgid]); /* --sys-ca-certs */
|
||
#endif
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
printf("%s", msg[++msgid]); /* --onlyPskDheKe */
|
||
#endif
|
||
#ifndef NO_PSK
|
||
printf("%s", msg[++msgid]); /* --openssl-psk */
|
||
#endif
|
||
#ifdef HAVE_RPK
|
||
printf("%s", msg[++msgid]); /* --rpk */
|
||
#endif
|
||
printf("%s", msg[++msgid]); /* --files-are-der */
|
||
printf("%s", msg[++msgid]); /* Documentation Hint */
|
||
}
|
||
|
||
#ifdef WOLFSSL_SRTP
|
||
/**
|
||
* client_srtp_test() - test that the computed ekm matches with the server one
|
||
* @ssl: ssl context
|
||
* @srtp_helper: srtp_test_helper struct shared with the server
|
||
*
|
||
* if @srtp_helper is NULL no check is made, but the ekm is printed.
|
||
*
|
||
* calls srtp_helper_get_ekm() to wait and then get the ekm computed by the
|
||
* server, then check if it matches the one computed by itself.
|
||
*/
|
||
static int client_srtp_test(WOLFSSL *ssl, func_args *args)
|
||
{
|
||
size_t srtp_secret_length;
|
||
byte *srtp_secret, *p;
|
||
int ret;
|
||
#ifdef WOLFSSL_COND
|
||
srtp_test_helper *srtp_helper = args->srtp_helper;
|
||
byte *other_secret = NULL;
|
||
size_t other_size = 0;
|
||
#else
|
||
(void)args;
|
||
#endif
|
||
|
||
ret = wolfSSL_export_dtls_srtp_keying_material(ssl, NULL,
|
||
&srtp_secret_length);
|
||
if (ret != WC_NO_ERR_TRACE(LENGTH_ONLY_E)) {
|
||
LOG_ERROR("DTLS SRTP: Error getting keying material length\n");
|
||
return ret;
|
||
}
|
||
|
||
srtp_secret = (byte*)XMALLOC(srtp_secret_length,
|
||
NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
if (srtp_secret == NULL) {
|
||
err_sys("DTLS SRTP: Low memory");
|
||
}
|
||
|
||
ret = wolfSSL_export_dtls_srtp_keying_material(ssl, srtp_secret,
|
||
&srtp_secret_length);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
XFREE(srtp_secret, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
LOG_ERROR("DTLS SRTP: Error getting keying material\n");
|
||
return ret;
|
||
}
|
||
|
||
printf("DTLS SRTP: Exported key material: ");
|
||
for (p = srtp_secret; p < srtp_secret + srtp_secret_length; p++)
|
||
printf("%02X", *p);
|
||
printf("\n");
|
||
|
||
#ifdef WOLFSSL_COND
|
||
if (srtp_helper != NULL) {
|
||
srtp_helper_get_ekm(srtp_helper, &other_secret, &other_size);
|
||
|
||
if (other_size != srtp_secret_length ||
|
||
(XMEMCMP(other_secret, srtp_secret, srtp_secret_length) != 0)) {
|
||
|
||
/* we are delegated from server to free this buffer */
|
||
XFREE(other_secret, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
printf("DTLS SRTP: Exported Keying Material mismatch\n");
|
||
return WOLFSSL_UNKNOWN;
|
||
}
|
||
|
||
/* we are delegated from server to free this buffer */
|
||
XFREE(other_secret, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
}
|
||
#endif /* WOLFSSL_COND */
|
||
|
||
XFREE(srtp_secret, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
|
||
return 0;
|
||
}
|
||
#endif /* WOLFSSL_SRTP */
|
||
|
||
#if defined(WOLFSSL_STATIC_MEMORY) && \
|
||
defined(WOLFSSL_STATIC_MEMORY_DEBUG_CALLBACK)
|
||
static void ExampleDebugMemoryCb(size_t sz, int bucketSz, byte st, int type) {
|
||
switch (st) {
|
||
case WOLFSSL_DEBUG_MEMORY_ALLOC:
|
||
if (type == DYNAMIC_TYPE_IN_BUFFER) {
|
||
printf("IN BUFFER: ");
|
||
}
|
||
|
||
if (type == DYNAMIC_TYPE_OUT_BUFFER) {
|
||
printf("OUT BUFFER: ");
|
||
}
|
||
|
||
printf("Alloc'd %d bytes using bucket size %d\n", (int)sz,
|
||
bucketSz);
|
||
break;
|
||
|
||
case WOLFSSL_DEBUG_MEMORY_FAIL:
|
||
printf("Failed when trying to allocate %d bytes\n", (int)sz);
|
||
break;
|
||
|
||
case WOLFSSL_DEBUG_MEMORY_FREE:
|
||
printf("Free'ing : %d\n", (int)sz);
|
||
break;
|
||
|
||
case WOLFSSL_DEBUG_MEMORY_INIT:
|
||
printf("Creating memory bucket of size : %d\n", bucketSz);
|
||
break;
|
||
}
|
||
}
|
||
#endif
|
||
|
||
|
||
|
||
THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
|
||
{
|
||
SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID;
|
||
|
||
wolfSSL_method_func method = NULL;
|
||
WOLFSSL_CTX* ctx = NULL;
|
||
WOLFSSL* ssl = NULL;
|
||
|
||
#ifdef WOLFSSL_WOLFSENTRY_HOOKS
|
||
wolfsentry_errcode_t wolfsentry_ret;
|
||
#endif
|
||
|
||
WOLFSSL* sslResume = NULL;
|
||
WOLFSSL_SESSION* session = NULL;
|
||
#if !defined(NO_SESSION_CACHE) && (defined(OPENSSL_EXTRA) || \
|
||
defined(HAVE_EXT_CACHE))
|
||
byte* flatSession = NULL;
|
||
int flatSessionSz = 0;
|
||
#endif
|
||
|
||
char msg[CLI_MSG_SZ];
|
||
int msgSz = 0;
|
||
char reply[CLI_REPLY_SZ];
|
||
|
||
word16 port = wolfSSLPort;
|
||
char* host = (char*)wolfSSLIP;
|
||
const char* domain = "localhost"; /* can't default to www.wolfssl.com
|
||
because can't tell if we're really
|
||
going there to detect old chacha-poly
|
||
*/
|
||
#ifndef WOLFSSL_VXWORKS
|
||
int ch;
|
||
static const struct mygetopt_long_config long_options[] = {
|
||
#if defined(WOLFSSL_WOLFSENTRY_HOOKS) && !defined(NO_FILESYSTEM) && \
|
||
!defined(WOLFSENTRY_NO_JSON)
|
||
{ "wolfsentry-config", 1, 256 },
|
||
#endif
|
||
{ "help", 0, 257 },
|
||
#ifndef NO_MULTIBYTE_PRINT
|
||
{ "ヘルプ", 0, 258 },
|
||
#endif
|
||
#if defined(HAVE_PQC)
|
||
{ "pqc", 1, 259 },
|
||
#endif
|
||
#ifdef WOLFSSL_SRTP
|
||
{ "srtp", 2, 260 }, /* optional argument */
|
||
#endif
|
||
#ifdef WOLFSSL_DTLS13
|
||
/* allow waitTicket option even when HAVE_SESSION_TICKET is 0. Otherwise
|
||
* tests that use this option will ignore the options following
|
||
* --waitTicket in the command line and fail */
|
||
{"waitTicket", 0, 261},
|
||
#endif /* WOLFSSL_DTLS13 */
|
||
#ifdef WOLFSSL_DTLS_CID
|
||
{"cid", 2, 262},
|
||
#endif /* WOLFSSL_DTLS_CID */
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
{ "sys-ca-certs", 0, 263 },
|
||
#endif
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
{ "onlyPskDheKe", 0, 264 },
|
||
#endif
|
||
#ifndef NO_PSK
|
||
{ "openssl-psk", 0, 265 },
|
||
#endif
|
||
{ "quieter", 0, 266 },
|
||
#ifdef HAVE_RPK
|
||
{ "rpk", 0, 267 },
|
||
#endif /* HAVE_RPK */
|
||
{ "files-are-der", 0, 268 },
|
||
#if defined(WOLFSSL_SYS_CRYPTO_POLICY)
|
||
{ "crypto-policy", 1, 269 },
|
||
#endif /* WOLFSSL_SYS_CRYPTO_POLICY */
|
||
{ 0, 0, 0 }
|
||
};
|
||
#endif
|
||
int version = CLIENT_INVALID_VERSION;
|
||
int minVersion = CLIENT_INVALID_VERSION;
|
||
int usePsk = 0;
|
||
int opensslPsk = 0;
|
||
int useAnon = 0;
|
||
int sendGET = 0;
|
||
int benchmark = 0;
|
||
int block = TEST_BUFFER_SIZE;
|
||
size_t throughput = 0;
|
||
int doDTLS = 0;
|
||
int dtlsUDP = 0;
|
||
#if (defined(WOLFSSL_SCTP) || defined(WOLFSSL_DTLS_MTU)) && \
|
||
defined(WOLFSSL_DTLS)
|
||
int dtlsMTU = 0;
|
||
#endif
|
||
int dtlsSCTP = 0;
|
||
int doMcast = 0;
|
||
int matchName = 0;
|
||
int doPeerCheck = 1;
|
||
int nonBlocking = 0;
|
||
int simulateWantWrite = 0;
|
||
int resumeSession = 0;
|
||
int wc_shutdown = 0;
|
||
int disableCRL = 0;
|
||
int externalTest = 0;
|
||
int ret;
|
||
int err = 0;
|
||
int scr = 0; /* allow secure renegotiation */
|
||
int forceScr = 0; /* force client initiated scr */
|
||
int scrAppData = 0;
|
||
int resumeScr = 0; /* use resumption for renegotiation */
|
||
#ifndef WOLFSSL_NO_CLIENT_AUTH
|
||
int useClientCert = 1;
|
||
#else
|
||
int useClientCert = 0;
|
||
#endif
|
||
int fewerPackets = 0;
|
||
int atomicUser = 0;
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
int pkCallbacks = 0;
|
||
PkCbInfo pkCbInfo;
|
||
#endif
|
||
int minDhKeyBits = DEFAULT_MIN_DHKEY_BITS;
|
||
char* alpnList = NULL;
|
||
unsigned char alpn_opt = 0;
|
||
char* cipherList = NULL;
|
||
int useDefCipherList = 0;
|
||
int customVerifyCert = 0;
|
||
const char* verifyCert;
|
||
const char* ourCert;
|
||
const char* ourKey;
|
||
|
||
int doSTARTTLS = 0;
|
||
char* starttlsProt = NULL;
|
||
int useVerifyCb = 0;
|
||
int useSupCurve = 0;
|
||
|
||
#ifdef WOLFSSL_TRUST_PEER_CERT
|
||
const char* trustCert = NULL;
|
||
#endif
|
||
|
||
#ifdef HAVE_SNI
|
||
char* sniHostName = NULL;
|
||
#endif
|
||
#ifdef HAVE_TRUSTED_CA
|
||
int trustedCaKeyId = 0;
|
||
#endif
|
||
#ifdef HAVE_MAX_FRAGMENT
|
||
byte maxFragment = 0;
|
||
#endif
|
||
#ifdef HAVE_TRUNCATED_HMAC
|
||
byte truncatedHMAC = 0;
|
||
#endif
|
||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
||
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
|
||
byte statusRequest = 0;
|
||
byte mustStaple = 0;
|
||
#endif
|
||
#ifdef HAVE_EXTENDED_MASTER
|
||
byte disableExtMasterSecret = 0;
|
||
#endif
|
||
int helloRetry = 0;
|
||
int onlyKeyShare = 0;
|
||
#ifdef WOLFSSL_TLS13
|
||
int noPskDheKe = 0;
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
int onlyPskDheKe = 0;
|
||
#endif
|
||
int postHandAuth = 0;
|
||
#endif
|
||
int updateKeysIVs = 0;
|
||
int earlyData = 0;
|
||
#ifdef WOLFSSL_MULTICAST
|
||
byte mcastID = 0;
|
||
#endif
|
||
#if !defined(NO_DH) && !defined(HAVE_FIPS) && \
|
||
!defined(HAVE_SELFTEST) && !defined(WOLFSSL_OLD_PRIME_CHECK)
|
||
int doDhKeyCheck = 1;
|
||
#endif
|
||
|
||
#ifdef HAVE_OCSP
|
||
int useOcsp = 0;
|
||
char* ocspUrl = NULL;
|
||
#endif
|
||
int useX25519 = 0;
|
||
int useX448 = 0;
|
||
int usePqc = 0;
|
||
char* pqcAlg = NULL;
|
||
int exitWithRet = 0;
|
||
int loadCertKeyIntoSSLObj = 0;
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
byte loadSysCaCerts = 0;
|
||
#endif
|
||
|
||
#ifdef HAVE_ENCRYPT_THEN_MAC
|
||
int disallowETM = 0;
|
||
#endif
|
||
|
||
#ifdef HAVE_WNR
|
||
const char* wnrConfigFile = wnrConfig;
|
||
#endif
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
int useCertFolder = 0;
|
||
#endif
|
||
#ifdef WOLFSSL_SRTP
|
||
const char* dtlsSrtpProfiles = NULL;
|
||
#endif
|
||
|
||
#ifdef HAVE_SESSION_TICKET
|
||
int waitTicket = 0;
|
||
#endif /* HAVE_SESSION_TICKET */
|
||
#ifdef WOLFSSL_DTLS_CID
|
||
int useDtlsCID = 0;
|
||
char dtlsCID[DTLS_CID_BUFFER_SIZE] = { 0 };
|
||
#endif /* WOLFSSL_DTLS_CID */
|
||
#ifdef HAVE_RPK
|
||
int useRPK = 0;
|
||
#endif /* HAVE_RPK */
|
||
int fileFormat = WOLFSSL_FILETYPE_PEM;
|
||
#if defined(WOLFSSL_SYS_CRYPTO_POLICY)
|
||
const char * policy = NULL;
|
||
#endif /* WOLFSSL_SYS_CRYPTO_POLICY */
|
||
|
||
|
||
char buffer[WOLFSSL_MAX_ERROR_SZ];
|
||
|
||
int argc = ((func_args*)args)->argc;
|
||
char** argv = ((func_args*)args)->argv;
|
||
|
||
|
||
#ifdef WOLFSSL_STATIC_MEMORY
|
||
#if (defined(HAVE_ECC) && !defined(ALT_ECC_SIZE)) \
|
||
|| defined(SESSION_CERTS)
|
||
/* big enough to handle most cases including session certs */
|
||
byte memory[320000];
|
||
#else
|
||
byte memory[80000];
|
||
#endif
|
||
byte memoryIO[34500]; /* max for IO buffer (TLS packet can be 16k) */
|
||
#if !defined(WOLFSSL_STATIC_MEMORY_LEAN)
|
||
WOLFSSL_MEM_CONN_STATS ssl_stats;
|
||
#if defined(DEBUG_WOLFSSL)
|
||
WOLFSSL_MEM_STATS mem_stats;
|
||
#endif
|
||
#endif
|
||
WOLFSSL_HEAP_HINT *heap = NULL;
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_DUAL_ALG_CERTS
|
||
/* Set our preference for verification to be for both the native and
|
||
* alternative chains. Ultimately, its the server's choice. This will be
|
||
* used in the call to wolfSSL_UseCKS(). */
|
||
byte cks_order[3] = {
|
||
WOLFSSL_CKS_SIGSPEC_BOTH,
|
||
WOLFSSL_CKS_SIGSPEC_ALTERNATIVE,
|
||
WOLFSSL_CKS_SIGSPEC_NATIVE,
|
||
};
|
||
#endif /* WOLFSSL_DUAL_ALG_CERTS */
|
||
|
||
((func_args*)args)->return_code = -1; /* error state */
|
||
|
||
#ifndef NO_RSA
|
||
verifyCert = caCertFile;
|
||
ourCert = cliCertFile;
|
||
ourKey = cliKeyFile;
|
||
#else
|
||
#ifdef HAVE_ECC
|
||
verifyCert = caEccCertFile;
|
||
ourCert = cliEccCertFile;
|
||
ourKey = cliEccKeyFile;
|
||
#elif defined(HAVE_ED25519)
|
||
verifyCert = caEdCertFile;
|
||
ourCert = cliEdCertFile;
|
||
ourKey = cliEdKeyFile;
|
||
#elif defined(HAVE_ED448)
|
||
verifyCert = caEd448CertFile;
|
||
ourCert = cliEd448CertFile;
|
||
ourKey = cliEd448KeyFile;
|
||
#else
|
||
verifyCert = NULL;
|
||
ourCert = NULL;
|
||
ourKey = NULL;
|
||
#endif
|
||
#endif
|
||
|
||
(void)session;
|
||
(void)sslResume;
|
||
(void)atomicUser;
|
||
(void)scr;
|
||
(void)forceScr;
|
||
(void)scrAppData;
|
||
(void)resumeScr;
|
||
(void)ourKey;
|
||
(void)ourCert;
|
||
(void)verifyCert;
|
||
(void)useClientCert;
|
||
(void)disableCRL;
|
||
(void)minDhKeyBits;
|
||
(void)alpnList;
|
||
(void)alpn_opt;
|
||
(void)updateKeysIVs;
|
||
(void)earlyData;
|
||
(void)useX25519;
|
||
(void)useX448;
|
||
(void)helloRetry;
|
||
(void)onlyKeyShare;
|
||
(void)useSupCurve;
|
||
(void)loadCertKeyIntoSSLObj;
|
||
(void)usePqc;
|
||
(void)pqcAlg;
|
||
(void)opensslPsk;
|
||
(void)fileFormat;
|
||
StackTrap();
|
||
|
||
/* Reinitialize the global myVerifyAction. */
|
||
myVerifyAction = VERIFY_OVERRIDE_ERROR;
|
||
|
||
#ifndef WOLFSSL_VXWORKS
|
||
/* Not used: All used */
|
||
while ((ch = mygetopt_long(argc, argv, "?:"
|
||
"ab:c:defgh:i;jk:l:mnop:q:rstu;v:wxyz"
|
||
"A:B:CDE:F:GH:IJKL:M:NO:PQRS:TUVW:XYZ:"
|
||
"01:23:4567:89"
|
||
"@#", long_options, 0)) != -1) {
|
||
switch (ch) {
|
||
case '?' :
|
||
if(myoptarg!=NULL) {
|
||
lng_index = atoi(myoptarg);
|
||
if(lng_index<0||lng_index>1){
|
||
lng_index = 0;
|
||
}
|
||
}
|
||
Usage();
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
|
||
case 257 :
|
||
lng_index = 0;
|
||
Usage();
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
|
||
case 258 :
|
||
lng_index = 1;
|
||
Usage();
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
|
||
case 'g' :
|
||
sendGET = 1;
|
||
break;
|
||
|
||
case 'd' :
|
||
doPeerCheck = 0;
|
||
break;
|
||
|
||
case 'e' :
|
||
ShowCiphers();
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
|
||
case 'D' :
|
||
myVerifyAction = VERIFY_OVERRIDE_DATE_ERR;
|
||
break;
|
||
|
||
case 'C' :
|
||
#ifdef HAVE_CRL
|
||
disableCRL = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'u' :
|
||
doDTLS = 1;
|
||
dtlsUDP = 1;
|
||
#if (defined(WOLFSSL_SCTP) || defined(WOLFSSL_DTLS_MTU)) && \
|
||
defined(WOLFSSL_DTLS)
|
||
dtlsMTU = atoi(myoptarg);
|
||
#endif
|
||
break;
|
||
|
||
#ifdef WOLFSSL_SRTP
|
||
case 260:
|
||
doDTLS = 1;
|
||
dtlsUDP = 1;
|
||
dtlsSrtpProfiles = myoptarg != NULL ? myoptarg :
|
||
"SRTP_AES128_CM_SHA1_80";
|
||
printf("Using SRTP Profile(s): %s\n", dtlsSrtpProfiles);
|
||
break;
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_DTLS13
|
||
case 261:
|
||
#ifdef HAVE_SESSION_TICKET
|
||
waitTicket = 1;
|
||
#endif /* HAVE_SESSION_TICKET */
|
||
break;
|
||
#endif /* WOLFSSL_DTLS13 */
|
||
#ifdef WOLFSSL_DTLS_CID
|
||
case 262:
|
||
useDtlsCID = 1;
|
||
if (myoptarg != NULL) {
|
||
if (XSTRLEN(myoptarg) >= DTLS_CID_BUFFER_SIZE) {
|
||
err_sys("provided connection ID is too big");
|
||
}
|
||
else {
|
||
XSTRLCPY(dtlsCID, myoptarg, DTLS_CID_BUFFER_SIZE);
|
||
}
|
||
}
|
||
break;
|
||
#endif /* WOLFSSL_CID */
|
||
case 'G' :
|
||
#ifdef WOLFSSL_SCTP
|
||
doDTLS = 1;
|
||
dtlsUDP = 1;
|
||
dtlsSCTP = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 's' :
|
||
usePsk = 1;
|
||
break;
|
||
|
||
#ifdef WOLFSSL_TRUST_PEER_CERT
|
||
case 'E' :
|
||
trustCert = myoptarg;
|
||
break;
|
||
#endif
|
||
|
||
case 'm' :
|
||
matchName = 1;
|
||
break;
|
||
|
||
case 'x' :
|
||
useClientCert = 0;
|
||
break;
|
||
|
||
case 'X' :
|
||
externalTest = 1;
|
||
break;
|
||
|
||
case 'f' :
|
||
fewerPackets = 1;
|
||
break;
|
||
|
||
case 'U' :
|
||
#if defined(ATOMIC_USER) && !defined(WOLFSSL_AEAD_ONLY)
|
||
atomicUser = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'P' :
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
pkCallbacks = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'h' :
|
||
host = myoptarg;
|
||
domain = myoptarg;
|
||
break;
|
||
|
||
case 'p' :
|
||
port = (word16)atoi(myoptarg);
|
||
#if !defined(NO_MAIN_DRIVER) || defined(USE_WINDOWS_API)
|
||
if (port == 0)
|
||
err_sys("port number cannot be 0");
|
||
#endif
|
||
break;
|
||
|
||
case 'v' :
|
||
if (myoptarg[0] == 'd') {
|
||
version = CLIENT_DOWNGRADE_VERSION;
|
||
break;
|
||
}
|
||
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
|
||
else if (myoptarg[0] == 'e') {
|
||
version = EITHER_DOWNGRADE_VERSION;
|
||
#ifndef NO_CERTS
|
||
loadCertKeyIntoSSLObj = 1;
|
||
#endif
|
||
break;
|
||
}
|
||
#endif
|
||
version = atoi(myoptarg);
|
||
if (version < 0 || version > 4) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
break;
|
||
|
||
case 'V' :
|
||
ShowVersions();
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
|
||
case 'l' :
|
||
cipherList = myoptarg;
|
||
break;
|
||
|
||
case 'H' :
|
||
if (XSTRCMP(myoptarg, "defCipherList") == 0) {
|
||
printf("Using default cipher list for testing\n");
|
||
useDefCipherList = 1;
|
||
}
|
||
else if (XSTRCMP(myoptarg, "exitWithRet") == 0) {
|
||
printf("Skip exit() for testing\n");
|
||
exitWithRet = 1;
|
||
}
|
||
else if (XSTRCMP(myoptarg, "verifyFail") == 0) {
|
||
printf("Verify should fail\n");
|
||
myVerifyAction = VERIFY_FORCE_FAIL;
|
||
}
|
||
else if (XSTRCMP(myoptarg, "verifyInfo") == 0) {
|
||
printf("Verify should not override error\n");
|
||
myVerifyAction = VERIFY_USE_PREVERIFY;
|
||
}
|
||
else if (XSTRCMP(myoptarg, "useSupCurve") == 0) {
|
||
printf("Attempting to test use supported curve\n");
|
||
#if defined(HAVE_ECC) && defined(HAVE_SUPPORTED_CURVES)
|
||
useSupCurve = 1;
|
||
#else
|
||
printf("Supported curves not compiled in!\n");
|
||
#endif
|
||
}
|
||
else if (XSTRCMP(myoptarg, "loadSSL") == 0) {
|
||
printf("Load cert/key into wolfSSL object\n");
|
||
#ifndef NO_CERTS
|
||
loadCertKeyIntoSSLObj = 1;
|
||
#else
|
||
printf("Certs turned off with NO_CERTS!\n");
|
||
#endif
|
||
}
|
||
else if (XSTRCMP(myoptarg, "disallowETM") == 0) {
|
||
printf("Disallow Encrypt-Then-MAC\n");
|
||
#ifdef HAVE_ENCRYPT_THEN_MAC
|
||
disallowETM = 1;
|
||
#endif
|
||
}
|
||
else {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
break;
|
||
|
||
case 'A' :
|
||
customVerifyCert = 1;
|
||
verifyCert = myoptarg;
|
||
break;
|
||
|
||
case 'c' :
|
||
ourCert = myoptarg;
|
||
break;
|
||
|
||
case 'k' :
|
||
ourKey = myoptarg;
|
||
break;
|
||
|
||
case 'Z' :
|
||
#ifndef NO_DH
|
||
minDhKeyBits = atoi(myoptarg);
|
||
if (minDhKeyBits <= 0 || minDhKeyBits > 16000) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
#endif
|
||
break;
|
||
|
||
case 'b' :
|
||
benchmark = atoi(myoptarg);
|
||
if (benchmark < 0 || benchmark > 1000000) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
break;
|
||
|
||
case 'B' :
|
||
throughput = (size_t)atol(myoptarg);
|
||
for (; *myoptarg != '\0'; myoptarg++) {
|
||
if (*myoptarg == ',') {
|
||
block = atoi(myoptarg + 1);
|
||
break;
|
||
}
|
||
}
|
||
if (throughput == 0 || block <= 0) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
break;
|
||
|
||
case 'N' :
|
||
nonBlocking = 1;
|
||
break;
|
||
|
||
case 'r' :
|
||
resumeSession = 1;
|
||
break;
|
||
|
||
case 'w' :
|
||
wc_shutdown = 1;
|
||
break;
|
||
|
||
case 'R' :
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
scr = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'i' :
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
scr = 1;
|
||
forceScr = 1;
|
||
if (XSTRCMP(myoptarg, "scr-app-data") == 0) {
|
||
scrAppData = 1;
|
||
}
|
||
#endif
|
||
break;
|
||
|
||
case 'z' :
|
||
#ifndef WOLFSSL_LEANPSK
|
||
wolfSSL_GetObjectSize();
|
||
#endif
|
||
break;
|
||
|
||
case 'S' :
|
||
if (XSTRCMP(myoptarg, "check") == 0) {
|
||
#ifdef HAVE_SNI
|
||
printf("SNI is: ON\n");
|
||
#else
|
||
printf("SNI is: OFF\n");
|
||
#endif
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
}
|
||
#ifdef HAVE_SNI
|
||
sniHostName = myoptarg;
|
||
#endif
|
||
break;
|
||
|
||
case 'F' :
|
||
#ifdef HAVE_MAX_FRAGMENT
|
||
maxFragment = (byte)atoi(myoptarg);
|
||
if (maxFragment < WOLFSSL_MFL_MIN ||
|
||
maxFragment > WOLFSSL_MFL_MAX) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
#endif
|
||
break;
|
||
|
||
case 'T' :
|
||
#ifdef HAVE_TRUNCATED_HMAC
|
||
truncatedHMAC = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'n' :
|
||
#ifdef HAVE_EXTENDED_MASTER
|
||
disableExtMasterSecret = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'W' :
|
||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
||
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
|
||
{
|
||
word32 myoptargSz;
|
||
|
||
statusRequest = (byte)atoi(myoptarg);
|
||
if (statusRequest > OCSP_STAPLING_OPT_MAX) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
|
||
myoptargSz = (word32)XSTRLEN(myoptarg);
|
||
if (myoptargSz > 0 &&
|
||
XTOUPPER((unsigned char)myoptarg[myoptargSz-1]) == 'M') {
|
||
mustStaple = 1;
|
||
}
|
||
}
|
||
#endif
|
||
break;
|
||
|
||
case 'o' :
|
||
#ifdef HAVE_OCSP
|
||
useOcsp = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'O' :
|
||
#ifdef HAVE_OCSP
|
||
useOcsp = 1;
|
||
ocspUrl = myoptarg;
|
||
#endif
|
||
break;
|
||
|
||
case 'a' :
|
||
#ifdef HAVE_ANON
|
||
useAnon = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'L' :
|
||
#ifdef HAVE_ALPN
|
||
alpnList = myoptarg;
|
||
|
||
if (alpnList[0] == 'C' && alpnList[1] == ':')
|
||
alpn_opt = WOLFSSL_ALPN_CONTINUE_ON_MISMATCH;
|
||
else if (alpnList[0] == 'F' && alpnList[1] == ':')
|
||
alpn_opt = WOLFSSL_ALPN_FAILED_ON_MISMATCH;
|
||
else {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
|
||
alpnList += 2;
|
||
|
||
#endif
|
||
break;
|
||
|
||
case 'M' :
|
||
doSTARTTLS = 1;
|
||
starttlsProt = myoptarg;
|
||
|
||
if (XSTRCMP(starttlsProt, "smtp") != 0) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
|
||
break;
|
||
|
||
case 'q' :
|
||
#ifdef HAVE_WNR
|
||
wnrConfigFile = myoptarg;
|
||
#endif
|
||
break;
|
||
|
||
case 'J' :
|
||
#ifdef WOLFSSL_TLS13
|
||
helloRetry = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'K' :
|
||
#ifdef WOLFSSL_TLS13
|
||
noPskDheKe = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'I' :
|
||
#ifdef WOLFSSL_TLS13
|
||
updateKeysIVs = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'y' :
|
||
#if defined(WOLFSSL_TLS13) && \
|
||
defined(HAVE_SUPPORTED_CURVES) && !defined(NO_DH)
|
||
onlyKeyShare = 1;
|
||
#endif
|
||
break;
|
||
|
||
case 'Y' :
|
||
#if defined(WOLFSSL_TLS13) && \
|
||
defined(HAVE_SUPPORTED_CURVES) && defined(HAVE_ECC)
|
||
onlyKeyShare = 2;
|
||
#endif
|
||
break;
|
||
|
||
case 'j' :
|
||
useVerifyCb = 1;
|
||
break;
|
||
|
||
case 't' :
|
||
#ifdef HAVE_CURVE25519
|
||
useX25519 = 1;
|
||
#ifdef HAVE_ECC
|
||
useSupCurve = 1;
|
||
#if defined(WOLFSSL_TLS13) && \
|
||
defined(HAVE_SUPPORTED_CURVES)
|
||
onlyKeyShare = 2;
|
||
#endif
|
||
#endif
|
||
#endif
|
||
break;
|
||
|
||
case 'Q' :
|
||
#if defined(WOLFSSL_TLS13) && \
|
||
defined(WOLFSSL_POST_HANDSHAKE_AUTH)
|
||
postHandAuth = 1;
|
||
#endif
|
||
break;
|
||
|
||
case '0' :
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
earlyData = 1;
|
||
#endif
|
||
break;
|
||
|
||
case '1' :
|
||
lng_index = atoi(myoptarg);
|
||
if(lng_index<0||lng_index>1){
|
||
lng_index = 0;
|
||
}
|
||
break;
|
||
|
||
case '2' :
|
||
#if !defined(NO_DH) && !defined(HAVE_FIPS) && \
|
||
!defined(HAVE_SELFTEST) && !defined(WOLFSSL_OLD_PRIME_CHECK)
|
||
doDhKeyCheck = 0;
|
||
#endif
|
||
break;
|
||
|
||
case '3' :
|
||
#ifdef WOLFSSL_MULTICAST
|
||
doMcast = 1;
|
||
mcastID = (byte)(atoi(myoptarg) & 0xFF);
|
||
#endif
|
||
break;
|
||
|
||
case '4' :
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
scr = 1;
|
||
forceScr = 1;
|
||
resumeScr = 1;
|
||
#endif
|
||
break;
|
||
|
||
case '5' :
|
||
#ifdef HAVE_TRUSTED_CA
|
||
trustedCaKeyId = 1;
|
||
#endif /* HAVE_TRUSTED_CA */
|
||
break;
|
||
|
||
case '6' :
|
||
#ifdef WOLFSSL_ASYNC_IO
|
||
nonBlocking = 1;
|
||
simulateWantWrite = 1;
|
||
#else
|
||
LOG_ERROR("Ignoring -6 since async I/O support not "
|
||
"compiled in.\n");
|
||
#endif
|
||
break;
|
||
|
||
case '7' :
|
||
minVersion = atoi(myoptarg);
|
||
if (minVersion < 0 || minVersion > 4) {
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
break;
|
||
|
||
case '8' :
|
||
#ifdef HAVE_CURVE448
|
||
useX448 = 1;
|
||
#ifdef HAVE_ECC
|
||
useSupCurve = 1;
|
||
#if defined(WOLFSSL_TLS13) && \
|
||
defined(HAVE_SUPPORTED_CURVES)
|
||
onlyKeyShare = 2;
|
||
#endif
|
||
#endif
|
||
#endif
|
||
break;
|
||
case '9' :
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
useCertFolder = 1;
|
||
#endif
|
||
break;
|
||
case '@' :
|
||
{
|
||
#ifdef HAVE_WC_INTROSPECTION
|
||
const char *conf_args = wolfSSL_configure_args();
|
||
if (conf_args) {
|
||
puts(conf_args);
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
} else {
|
||
fputs("configure args not compiled in.\n",stderr);
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
#else
|
||
fputs("compiled without BUILD_INTROSPECTION.\n",stderr);
|
||
XEXIT_T(MY_EX_USAGE);
|
||
#endif
|
||
}
|
||
|
||
case '#' :
|
||
{
|
||
#ifdef HAVE_WC_INTROSPECTION
|
||
const char *cflags = wolfSSL_global_cflags();
|
||
if (cflags) {
|
||
puts(cflags);
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
} else {
|
||
fputs("CFLAGS not compiled in.\n",stderr);
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
#else
|
||
fputs("compiled without BUILD_INTROSPECTION.\n",stderr);
|
||
XEXIT_T(MY_EX_USAGE);
|
||
#endif
|
||
}
|
||
|
||
#ifdef WOLFSSL_WOLFSENTRY_HOOKS
|
||
case 256:
|
||
#if !defined(NO_FILESYSTEM) && !defined(WOLFSENTRY_NO_JSON)
|
||
wolfsentry_config_path = myoptarg;
|
||
#endif
|
||
break;
|
||
#endif
|
||
|
||
#if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES) && \
|
||
defined(HAVE_PQC)
|
||
case 259:
|
||
usePqc = 1;
|
||
onlyKeyShare = 3;
|
||
pqcAlg = myoptarg;
|
||
break;
|
||
#endif
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
case 263:
|
||
loadSysCaCerts = 1;
|
||
break;
|
||
#endif
|
||
case 264:
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
#ifdef WOLFSSL_TLS13
|
||
onlyPskDheKe = 1;
|
||
#endif
|
||
#endif
|
||
break;
|
||
case 265:
|
||
#ifndef NO_PSK
|
||
opensslPsk = 1;
|
||
#endif
|
||
break;
|
||
case 266:
|
||
quieter = 1;
|
||
break;
|
||
case 267:
|
||
#ifdef HAVE_RPK
|
||
useRPK = 1;
|
||
#endif /* HAVE_RPK */
|
||
break;
|
||
case 268:
|
||
fileFormat = WOLFSSL_FILETYPE_ASN1;
|
||
break;
|
||
case 269:
|
||
#if defined(WOLFSSL_SYS_CRYPTO_POLICY)
|
||
policy = myoptarg;
|
||
#endif /* WOLFSSL_SYS_CRYPTO_POLICY */
|
||
break;
|
||
|
||
default:
|
||
Usage();
|
||
XEXIT_T(MY_EX_USAGE);
|
||
}
|
||
}
|
||
|
||
myoptind = 0; /* reset for test cases */
|
||
#endif /* !WOLFSSL_VXWORKS */
|
||
|
||
if (externalTest) {
|
||
/* detect build cases that wouldn't allow test against wolfssl.com */
|
||
int done = 0;
|
||
|
||
#ifdef NO_RSA
|
||
done += 1; /* require RSA for external tests */
|
||
#endif
|
||
|
||
if (!XSTRCMP(domain, "www.globalsign.com")) {
|
||
/* www.globalsign.com does not respond to ipv6 ocsp requests */
|
||
#if defined(TEST_IPV6) && defined(HAVE_OCSP)
|
||
done += 1;
|
||
#endif
|
||
|
||
/* www.globalsign.com has limited supported cipher suites */
|
||
#if defined(NO_AES) && defined(HAVE_OCSP)
|
||
done += 1;
|
||
#endif
|
||
|
||
/* www.globalsign.com only supports static RSA or ECDHE with AES */
|
||
/* We cannot expect users to have on static RSA so test for ECC only
|
||
* as some users will most likely be on 32-bit systems where ECC
|
||
* is not enabled by default */
|
||
#if defined(HAVE_OCSP) && !defined(HAVE_ECC)
|
||
done += 1;
|
||
#endif
|
||
}
|
||
|
||
#ifndef NO_PSK
|
||
if (usePsk) {
|
||
done += 1; /* don't perform external tests if PSK is enabled */
|
||
}
|
||
#endif
|
||
|
||
#ifdef NO_SHA
|
||
done += 1; /* external cert chain most likely has SHA */
|
||
#endif
|
||
|
||
#if !defined(HAVE_ECC) && !defined(WOLFSSL_STATIC_RSA) \
|
||
|| ( defined(HAVE_ECC) && !defined(HAVE_SUPPORTED_CURVES) \
|
||
&& !defined(WOLFSSL_STATIC_RSA) )
|
||
/* google needs ECDHE+Supported Curves or static RSA */
|
||
if (!XSTRCASECMP(domain, "www.google.com"))
|
||
done += 1;
|
||
#endif
|
||
|
||
#if !defined(HAVE_ECC) && !defined(WOLFSSL_STATIC_RSA)
|
||
/* wolfssl needs ECDHE or static RSA */
|
||
if (!XSTRCASECMP(domain, "www.wolfssl.com"))
|
||
done += 1;
|
||
#endif
|
||
|
||
#if !defined(WOLFSSL_SHA384)
|
||
if (!XSTRCASECMP(domain, "www.wolfssl.com")) {
|
||
/* wolfssl need sha384 for cert chain verify */
|
||
done += 1;
|
||
}
|
||
#endif
|
||
|
||
#if !defined(HAVE_AESGCM) && defined(NO_AES) && \
|
||
!(defined(HAVE_CHACHA) && defined(HAVE_POLY1305))
|
||
/* need at least one of these for external tests */
|
||
done += 1;
|
||
#endif
|
||
|
||
/* For the external test, if we disable AES, GoDaddy will reject the
|
||
* connection. They only currently support AES suites, RC4 and 3DES
|
||
* suites. With AES disabled we only offer PolyChacha suites. */
|
||
#if defined(NO_AES) && !defined(HAVE_AESGCM)
|
||
if (!XSTRCASECMP(domain, "www.wolfssl.com")) {
|
||
done += 1;
|
||
}
|
||
#endif
|
||
|
||
if (done) {
|
||
LOG_ERROR("external test can't be run in this mode\n");
|
||
|
||
((func_args*)args)->return_code = 0;
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
}
|
||
}
|
||
|
||
/* sort out DTLS versus TLS versions */
|
||
if (version == CLIENT_INVALID_VERSION) {
|
||
if (doDTLS)
|
||
version = CLIENT_DTLS_DEFAULT_VERSION;
|
||
else
|
||
version = CLIENT_DEFAULT_VERSION;
|
||
}
|
||
else {
|
||
if (doDTLS) {
|
||
if (version == 3) {
|
||
version = -2;
|
||
}
|
||
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
|
||
else if (version == EITHER_DOWNGRADE_VERSION) {
|
||
version = -3;
|
||
}
|
||
#endif
|
||
else if (version == 4) {
|
||
#ifdef WOLFSSL_DTLS13
|
||
version = -4;
|
||
#else
|
||
err_sys("Bad DTLS version");
|
||
#endif /* WOLFSSL_DTLS13 */
|
||
}
|
||
else if (version == 2)
|
||
version = -1;
|
||
}
|
||
}
|
||
|
||
#ifndef HAVE_SESSION_TICKET
|
||
if ((version >= 4) && resumeSession) {
|
||
LOG_ERROR("Can't do TLS 1.3 resumption; need session tickets!\n");
|
||
}
|
||
#endif
|
||
|
||
#ifdef HAVE_WNR
|
||
if (wc_InitNetRandom(wnrConfigFile, NULL, 5000) != 0)
|
||
err_sys("can't load whitewood net random config file");
|
||
#endif
|
||
|
||
#ifdef HAVE_PQC
|
||
if (usePqc) {
|
||
if (version == CLIENT_DOWNGRADE_VERSION ||
|
||
version == EITHER_DOWNGRADE_VERSION)
|
||
LOG_ERROR(
|
||
"WARNING: If a TLS 1.3 connection is not negotiated, you "
|
||
"will not be using a post-quantum group.\n");
|
||
else if (version != 4 && version != -4)
|
||
err_sys("can only use post-quantum groups with TLS 1.3 or DTLS 1.3");
|
||
}
|
||
#endif
|
||
|
||
switch (version) {
|
||
#ifndef NO_OLD_TLS
|
||
#ifdef WOLFSSL_ALLOW_SSLV3
|
||
case 0:
|
||
method = wolfSSLv3_client_method_ex;
|
||
break;
|
||
#endif
|
||
|
||
#ifndef NO_TLS
|
||
#ifdef WOLFSSL_ALLOW_TLSV10
|
||
case 1:
|
||
method = wolfTLSv1_client_method_ex;
|
||
break;
|
||
#endif
|
||
|
||
case 2:
|
||
method = wolfTLSv1_1_client_method_ex;
|
||
break;
|
||
#endif /* !NO_TLS */
|
||
#endif /* !NO_OLD_TLS */
|
||
|
||
#ifndef NO_TLS
|
||
#ifndef WOLFSSL_NO_TLS12
|
||
case 3:
|
||
method = wolfTLSv1_2_client_method_ex;
|
||
break;
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_TLS13
|
||
case 4:
|
||
method = wolfTLSv1_3_client_method_ex;
|
||
break;
|
||
#endif
|
||
|
||
case CLIENT_DOWNGRADE_VERSION:
|
||
if (!doDTLS) {
|
||
method = wolfSSLv23_client_method_ex;
|
||
}
|
||
else {
|
||
#ifdef WOLFSSL_DTLS
|
||
method = wolfDTLS_client_method_ex;
|
||
#else
|
||
err_sys("version not supported");
|
||
#endif /* WOLFSSL_DTLS */
|
||
}
|
||
break;
|
||
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
|
||
case EITHER_DOWNGRADE_VERSION:
|
||
method = wolfSSLv23_method_ex;
|
||
break;
|
||
#endif
|
||
#endif /* NO_TLS */
|
||
|
||
#ifdef WOLFSSL_DTLS
|
||
#ifndef NO_OLD_TLS
|
||
case -1:
|
||
method = wolfDTLSv1_client_method_ex;
|
||
break;
|
||
#endif
|
||
|
||
#ifndef WOLFSSL_NO_TLS12
|
||
case -2:
|
||
method = wolfDTLSv1_2_client_method_ex;
|
||
break;
|
||
#endif
|
||
#ifdef WOLFSSL_DTLS13
|
||
case -4:
|
||
method = wolfDTLSv1_3_client_method_ex;
|
||
break;
|
||
#endif /* WOLFSSL_DTLS13 */
|
||
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_EITHER_SIDE)
|
||
case -3:
|
||
method = wolfDTLSv1_2_method_ex;
|
||
break;
|
||
#endif
|
||
#endif
|
||
|
||
default:
|
||
err_sys("Bad SSL version");
|
||
}
|
||
|
||
if (method == NULL)
|
||
err_sys("unable to get method");
|
||
|
||
#if defined(WOLFSSL_SYS_CRYPTO_POLICY)
|
||
if (policy != NULL) {
|
||
if (wolfSSL_crypto_policy_enable(policy) != WOLFSSL_SUCCESS) {
|
||
err_sys("wolfSSL_crypto_policy_enable failed");
|
||
}
|
||
}
|
||
#endif /* WOLFSSL_SYS_CRYPTO_POLICY */
|
||
|
||
#ifdef WOLFSSL_STATIC_MEMORY
|
||
#if defined(DEBUG_WOLFSSL) && !defined(WOLFSSL_STATIC_MEMORY_LEAN)
|
||
/* print off helper buffer sizes for use with static memory
|
||
* printing to stderr in case of debug mode turned on */
|
||
LOG_ERROR("static memory management size = %d\n",
|
||
wolfSSL_MemoryPaddingSz());
|
||
LOG_ERROR("calculated optimum general buffer size = %d\n",
|
||
wolfSSL_StaticBufferSz(memory, sizeof(memory), 0));
|
||
LOG_ERROR("calculated optimum IO buffer size = %d\n",
|
||
wolfSSL_StaticBufferSz(memoryIO, sizeof(memoryIO),
|
||
WOLFMEM_IO_POOL_FIXED));
|
||
#endif /* DEBUG_WOLFSSL */
|
||
|
||
if (wc_LoadStaticMemory(&heap, memory, sizeof(memory), WOLFMEM_GENERAL, 1)
|
||
!= 0) {
|
||
err_sys("unable to load static memory");
|
||
}
|
||
|
||
#if defined(WOLFSSL_STATIC_MEMORY) && \
|
||
defined(WOLFSSL_STATIC_MEMORY_DEBUG_CALLBACK)
|
||
wolfSSL_SetDebugMemoryCb(ExampleDebugMemoryCb);
|
||
#endif
|
||
ctx = wolfSSL_CTX_new_ex(method(heap), heap);
|
||
if (ctx == NULL)
|
||
err_sys("unable to get ctx");
|
||
#ifdef WOLFSSL_CALLBACKS
|
||
wolfSSL_CTX_set_msg_callback(ctx, msgDebugCb);
|
||
#endif
|
||
|
||
if (wolfSSL_CTX_load_static_memory(&ctx, NULL, memoryIO, sizeof(memoryIO),
|
||
WOLFMEM_IO_POOL_FIXED | WOLFMEM_TRACK_STATS, 1) != WOLFSSL_SUCCESS) {
|
||
err_sys("unable to load static memory");
|
||
}
|
||
#else
|
||
if (method != NULL) {
|
||
ctx = wolfSSL_CTX_new(method(NULL));
|
||
if (ctx == NULL)
|
||
err_sys("unable to get ctx");
|
||
}
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_SYS_CA_CERTS
|
||
if (loadSysCaCerts &&
|
||
wolfSSL_CTX_load_system_CA_certs(ctx) != WOLFSSL_SUCCESS) {
|
||
err_sys("wolfSSL_CTX_load_system_CA_certs failed");
|
||
}
|
||
#endif /* WOLFSSL_SYS_CA_CERTS */
|
||
|
||
if (minVersion != CLIENT_INVALID_VERSION) {
|
||
#ifdef WOLFSSL_DTLS
|
||
if (doDTLS) {
|
||
switch (minVersion) {
|
||
case 4:
|
||
#ifdef WOLFSSL_DTLS13
|
||
minVersion = WOLFSSL_DTLSV1_3;
|
||
break;
|
||
#else
|
||
err_sys("invalid minimum downgrade version");
|
||
#endif /* WOLFSSL_DTLS13 */
|
||
case 3:
|
||
minVersion = WOLFSSL_DTLSV1_2;
|
||
break;
|
||
case 2:
|
||
minVersion = WOLFSSL_DTLSV1;
|
||
break;
|
||
}
|
||
}
|
||
#endif /* WOLFSSL_DTLS */
|
||
if (wolfSSL_CTX_SetMinVersion(ctx, minVersion) != WOLFSSL_SUCCESS)
|
||
err_sys("can't set minimum downgrade version");
|
||
}
|
||
if (simulateWantWrite) {
|
||
#ifdef USE_WOLFSSL_IO
|
||
wolfSSL_CTX_SetIOSend(ctx, SimulateWantWriteIOSendCb);
|
||
#endif
|
||
}
|
||
|
||
#ifdef SINGLE_THREADED
|
||
if (wolfSSL_CTX_new_rng(ctx) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("Single Threaded new rng at CTX failed");
|
||
}
|
||
#endif
|
||
|
||
#ifdef OPENSSL_COMPATIBLE_DEFAULTS
|
||
/* Restore wolfSSL verify defaults */
|
||
if (ctx) {
|
||
wolfSSL_CTX_set_verify(ctx, WOLFSSL_VERIFY_DEFAULT, NULL);
|
||
}
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_SRTP
|
||
if (dtlsSrtpProfiles != NULL) {
|
||
if (wolfSSL_CTX_set_tlsext_use_srtp(ctx, dtlsSrtpProfiles)
|
||
!= 0) {
|
||
err_sys("unable to set DTLS SRTP profile");
|
||
}
|
||
}
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_WOLFSENTRY_HOOKS
|
||
if (wolfsentry_setup(&wolfsentry, wolfsentry_config_path,
|
||
WOLFSENTRY_ROUTE_FLAG_DIRECTION_OUT) < 0) {
|
||
err_sys("unable to initialize wolfSentry");
|
||
}
|
||
|
||
if (wolfSSL_CTX_set_ConnectFilter(
|
||
ctx,
|
||
(NetworkFilterCallback_t)wolfSentry_NetworkFilterCallback,
|
||
wolfsentry) < 0) {
|
||
err_sys("unable to install wolfSentry_NetworkFilterCallback");
|
||
}
|
||
#endif
|
||
|
||
if (cipherList && !useDefCipherList) {
|
||
if (wolfSSL_CTX_set_cipher_list(ctx, cipherList) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("client can't set cipher list 1");
|
||
}
|
||
}
|
||
|
||
#ifdef WOLFSSL_LEANPSK
|
||
if (!usePsk) {
|
||
usePsk = 1;
|
||
}
|
||
#endif
|
||
|
||
#if defined(NO_RSA) && !defined(HAVE_ECC) && !defined(HAVE_ED25519) && \
|
||
!defined(HAVE_ED448)
|
||
if (!usePsk) {
|
||
usePsk = 1;
|
||
}
|
||
#endif
|
||
|
||
if (fewerPackets)
|
||
wolfSSL_CTX_set_group_messages(ctx);
|
||
#if (defined(WOLFSSL_SCTP) || defined(WOLFSSL_DTLS_MTU)) && \
|
||
defined(WOLFSSL_DTLS)
|
||
if (dtlsMTU)
|
||
wolfSSL_CTX_dtls_set_mtu(ctx, (unsigned short)dtlsMTU);
|
||
#endif
|
||
|
||
#ifndef NO_DH
|
||
if (wolfSSL_CTX_SetMinDhKey_Sz(ctx, (word16)minDhKeyBits)
|
||
!= WOLFSSL_SUCCESS) {
|
||
err_sys("Error setting minimum DH key size");
|
||
}
|
||
#endif
|
||
|
||
#ifdef HAVE_RPK
|
||
if (useRPK) {
|
||
char ctype[] = {WOLFSSL_CERT_TYPE_RPK};
|
||
char stype[] = {WOLFSSL_CERT_TYPE_RPK};
|
||
|
||
wolfSSL_CTX_set_client_cert_type(ctx, ctype, sizeof(ctype)/sizeof(ctype[0]));
|
||
wolfSSL_CTX_set_server_cert_type(ctx, stype, sizeof(stype)/sizeof(stype[0]));
|
||
usePsk = 0;
|
||
#ifdef HAVE_CRL
|
||
disableCRL = 1;
|
||
#endif
|
||
doPeerCheck = 0;
|
||
}
|
||
#endif /* HAVE_RPK */
|
||
|
||
if (usePsk) {
|
||
#ifndef NO_PSK
|
||
const char *defaultCipherList = cipherList;
|
||
|
||
wolfSSL_CTX_set_psk_client_callback(ctx, my_psk_client_cb);
|
||
#ifdef WOLFSSL_TLS13
|
||
#if !defined(WOLFSSL_PSK_TLS13_CB) && !defined(WOLFSSL_PSK_ONE_ID)
|
||
if (!opensslPsk) {
|
||
wolfSSL_CTX_set_psk_client_cs_callback(ctx, my_psk_client_cs_cb);
|
||
}
|
||
else
|
||
#endif
|
||
{
|
||
wolfSSL_CTX_set_psk_client_tls13_callback(ctx,
|
||
my_psk_client_tls13_cb);
|
||
}
|
||
#endif
|
||
if (defaultCipherList == NULL) {
|
||
#if defined(HAVE_AESGCM) && !defined(NO_DH)
|
||
#ifdef WOLFSSL_TLS13
|
||
defaultCipherList = "TLS13-AES128-GCM-SHA256"
|
||
#ifndef WOLFSSL_NO_TLS12
|
||
":DHE-PSK-AES128-GCM-SHA256"
|
||
#endif
|
||
;
|
||
#else
|
||
defaultCipherList = "DHE-PSK-AES128-GCM-SHA256";
|
||
#endif
|
||
#elif defined(HAVE_AESGCM) && defined(WOLFSSL_TLS13)
|
||
defaultCipherList = "TLS13-AES128-GCM-SHA256"
|
||
#ifndef WOLFSSL_NO_TLS12
|
||
":PSK-AES128-GCM-SHA256"
|
||
#endif
|
||
;
|
||
#elif defined(HAVE_NULL_CIPHER)
|
||
defaultCipherList = "PSK-NULL-SHA256";
|
||
#elif !defined(NO_AES_CBC)
|
||
defaultCipherList = "PSK-AES128-CBC-SHA256";
|
||
#else
|
||
defaultCipherList = "PSK-AES128-GCM-SHA256";
|
||
#endif
|
||
if (wolfSSL_CTX_set_cipher_list(ctx, defaultCipherList)
|
||
!=WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("client can't set cipher list 2");
|
||
}
|
||
}
|
||
wolfSSL_CTX_set_psk_callback_ctx(ctx, (void*)defaultCipherList);
|
||
#endif
|
||
if (useClientCert) {
|
||
useClientCert = 0;
|
||
}
|
||
}
|
||
|
||
if (useAnon) {
|
||
#ifdef HAVE_ANON
|
||
if (cipherList == NULL || (cipherList && useDefCipherList)) {
|
||
const char* defaultCipherList;
|
||
wolfSSL_CTX_allow_anon_cipher(ctx);
|
||
defaultCipherList = "ADH-AES256-GCM-SHA384:"
|
||
"ADH-AES128-SHA";
|
||
if (wolfSSL_CTX_set_cipher_list(ctx,defaultCipherList)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("client can't set cipher list 4");
|
||
}
|
||
}
|
||
#endif
|
||
if (useClientCert) {
|
||
useClientCert = 0;
|
||
}
|
||
}
|
||
|
||
#ifdef WOLFSSL_SCTP
|
||
if (dtlsSCTP)
|
||
wolfSSL_CTX_dtls_set_sctp(ctx);
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_ENCRYPTED_KEYS
|
||
wolfSSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack);
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_SNIFFER
|
||
if (cipherList == NULL && version < 4) {
|
||
/* static RSA or ECC cipher suites */
|
||
const char* staticCipherList = "AES128-SHA:ECDH-ECDSA-AES128-SHA";
|
||
if (wolfSSL_CTX_set_cipher_list(ctx, staticCipherList) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("client can't set cipher list 3");
|
||
}
|
||
}
|
||
#endif
|
||
|
||
#ifdef HAVE_OCSP
|
||
if (useOcsp) {
|
||
#if defined(HAVE_IO_TIMEOUT) && defined(HAVE_HTTP_CLIENT)
|
||
wolfIO_SetTimeout(DEFAULT_TIMEOUT_SEC);
|
||
#endif
|
||
|
||
if (ocspUrl != NULL) {
|
||
wolfSSL_CTX_SetOCSP_OverrideURL(ctx, ocspUrl);
|
||
wolfSSL_CTX_EnableOCSP(ctx, WOLFSSL_OCSP_NO_NONCE
|
||
| WOLFSSL_OCSP_URL_OVERRIDE);
|
||
}
|
||
else {
|
||
wolfSSL_CTX_EnableOCSP(ctx, WOLFSSL_OCSP_CHECKALL);
|
||
}
|
||
|
||
#ifdef WOLFSSL_NONBLOCK_OCSP
|
||
wolfSSL_CTX_SetOCSP_Cb(ctx, OCSPIOCb, OCSPRespFreeCb, NULL);
|
||
#endif
|
||
}
|
||
#endif
|
||
|
||
#ifdef USER_CA_CB
|
||
wolfSSL_CTX_SetCACb(ctx, CaCb);
|
||
#endif
|
||
|
||
#if defined(HAVE_EXT_CACHE) && !defined(NO_SESSION_CACHE)
|
||
wolfSSL_CTX_sess_set_get_cb(ctx, mySessGetCb);
|
||
wolfSSL_CTX_sess_set_new_cb(ctx, mySessNewCb);
|
||
wolfSSL_CTX_sess_set_remove_cb(ctx, mySessRemCb);
|
||
#endif
|
||
|
||
#ifndef NO_CERTS
|
||
if (useClientCert && !loadCertKeyIntoSSLObj){
|
||
#if defined(NO_FILESYSTEM) && defined(USE_CERT_BUFFERS_2048)
|
||
if (wolfSSL_CTX_use_certificate_chain_buffer_format(ctx,
|
||
client_cert_der_2048, sizeof_client_cert_der_2048,
|
||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS)
|
||
err_sys("can't load client cert buffer");
|
||
#elif !defined(TEST_LOAD_BUFFER)
|
||
if (wolfSSL_CTX_use_certificate_chain_file_format(ctx, ourCert, fileFormat)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load client cert file, check file and run from"
|
||
" wolfSSL home dir");
|
||
}
|
||
#else
|
||
load_buffer(ctx, ourCert, WOLFSSL_CERT_CHAIN);
|
||
#endif
|
||
}
|
||
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
pkCbInfo.ourKey = ourKey;
|
||
#endif
|
||
if (useClientCert && !loadCertKeyIntoSSLObj
|
||
#if defined(HAVE_PK_CALLBACKS) && defined(TEST_PK_PRIVKEY)
|
||
&& !pkCallbacks
|
||
#endif
|
||
) {
|
||
#ifdef NO_FILESYSTEM
|
||
if (wolfSSL_CTX_use_PrivateKey_buffer(ctx, client_key_der_2048,
|
||
sizeof_client_key_der_2048, SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS)
|
||
err_sys("can't load client private key buffer");
|
||
#elif !defined(TEST_LOAD_BUFFER)
|
||
if (wolfSSL_CTX_use_PrivateKey_file(ctx, ourKey, fileFormat)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load client private key file, check file and run "
|
||
"from wolfSSL home dir");
|
||
}
|
||
#else
|
||
load_buffer(ctx, ourKey, WOLFSSL_KEY);
|
||
#endif
|
||
}
|
||
|
||
if (!usePsk && !useAnon && !useVerifyCb && myVerifyAction != VERIFY_FORCE_FAIL) {
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
if (useCertFolder) {
|
||
WOLFSSL_X509_STORE *store;
|
||
WOLFSSL_X509_LOOKUP *lookup;
|
||
|
||
store = wolfSSL_CTX_get_cert_store(ctx);
|
||
if (store == NULL) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't get WOLFSSL_X509_STORE");
|
||
}
|
||
lookup = wolfSSL_X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir());
|
||
if (lookup == NULL) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't add lookup");
|
||
}
|
||
if (wolfSSL_X509_LOOKUP_ctrl(lookup, WOLFSSL_X509_L_ADD_DIR, caCertFolder,
|
||
X509_FILETYPE_PEM, NULL) != WOLFSSL_SUCCESS) {
|
||
err_sys("X509_LOOKUP_ctrl w/ L_ADD_DIR failed");
|
||
}
|
||
} else {
|
||
#endif
|
||
#ifdef NO_FILESYSTEM
|
||
if (wolfSSL_CTX_load_verify_buffer(ctx, ca_cert_der_2048,
|
||
sizeof_ca_cert_der_2048, SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load ca buffer, Please run from wolfSSL home dir");
|
||
}
|
||
#elif !defined(TEST_LOAD_BUFFER)
|
||
unsigned int verify_flags = 0;
|
||
#ifdef TEST_BEFORE_DATE
|
||
verify_flags |= WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY;
|
||
#endif
|
||
if (doPeerCheck != 0 &&
|
||
wolfSSL_CTX_load_verify_locations_ex(ctx, verifyCert, 0, verify_flags)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load ca file, Please run from wolfSSL home dir");
|
||
}
|
||
#else
|
||
load_buffer(ctx, verifyCert, WOLFSSL_CA);
|
||
#endif /* !NO_FILESYSTEM */
|
||
|
||
#ifdef HAVE_ECC
|
||
/* load ecc verify too, echoserver uses it by default w/ ecc */
|
||
#ifdef NO_FILESYSTEM
|
||
if (doPeerCheck != 0 &&
|
||
wolfSSL_CTX_load_verify_buffer(ctx, ca_ecc_cert_der_256,
|
||
sizeof_ca_ecc_cert_der_256, SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load ecc ca buffer");
|
||
}
|
||
#elif !defined(TEST_LOAD_BUFFER)
|
||
if (doPeerCheck != 0 && !customVerifyCert &&
|
||
wolfSSL_CTX_load_verify_locations_ex(ctx, eccCertFile, 0, verify_flags)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load ecc ca file, Please run from wolfSSL home dir");
|
||
}
|
||
#else
|
||
load_buffer(ctx, eccCertFile, WOLFSSL_CA);
|
||
#endif /* !TEST_LOAD_BUFFER */
|
||
#endif /* HAVE_ECC */
|
||
#if defined(WOLFSSL_TRUST_PEER_CERT) && !defined(NO_FILESYSTEM)
|
||
if (trustCert) {
|
||
if (wolfSSL_CTX_trust_peer_cert(ctx, trustCert,
|
||
WOLFSSL_FILETYPE_PEM) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load trusted peer cert file");
|
||
}
|
||
}
|
||
#endif /* WOLFSSL_TRUST_PEER_CERT && !NO_FILESYSTEM */
|
||
#if defined(OPENSSL_ALL) && defined(WOLFSSL_CERT_GEN) && \
|
||
(defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT)) && \
|
||
!defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
|
||
}
|
||
#endif
|
||
}
|
||
if (useVerifyCb || myVerifyAction == VERIFY_FORCE_FAIL ||
|
||
myVerifyAction == VERIFY_USE_PREVERIFY) {
|
||
wolfSSL_CTX_set_verify(ctx, WOLFSSL_VERIFY_PEER, myVerify);
|
||
}
|
||
else if (!usePsk && !useAnon && doPeerCheck == 0) {
|
||
wolfSSL_CTX_set_verify(ctx, WOLFSSL_VERIFY_NONE, NULL);
|
||
}
|
||
else if (!usePsk && !useAnon && myVerifyAction == VERIFY_OVERRIDE_DATE_ERR) {
|
||
wolfSSL_CTX_set_verify(ctx, WOLFSSL_VERIFY_PEER, myVerify);
|
||
}
|
||
#endif /* !NO_CERTS */
|
||
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
ret = wolfAsync_DevOpen(&devId);
|
||
if (ret < 0) {
|
||
LOG_ERROR("Async device open failed\nRunning without async\n");
|
||
}
|
||
wolfSSL_CTX_SetDevId(ctx, devId);
|
||
#endif /* WOLFSSL_ASYNC_CRYPT */
|
||
|
||
#ifdef HAVE_SNI
|
||
if (sniHostName) {
|
||
if (wolfSSL_CTX_UseSNI(ctx, WOLFSSL_SNI_HOST_NAME, sniHostName,
|
||
(word16) XSTRLEN(sniHostName)) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseSNI failed");
|
||
}
|
||
}
|
||
#endif
|
||
#ifdef HAVE_MAX_FRAGMENT
|
||
if (maxFragment)
|
||
if (wolfSSL_CTX_UseMaxFragment(ctx, maxFragment) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseMaxFragment failed");
|
||
}
|
||
#endif
|
||
#ifdef HAVE_TRUNCATED_HMAC
|
||
if (truncatedHMAC)
|
||
if (wolfSSL_CTX_UseTruncatedHMAC(ctx) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseTruncatedHMAC failed");
|
||
}
|
||
#endif
|
||
#ifdef HAVE_SESSION_TICKET
|
||
if (wolfSSL_CTX_UseSessionTicket(ctx) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseSessionTicket failed");
|
||
}
|
||
#endif
|
||
#ifdef HAVE_EXTENDED_MASTER
|
||
if (disableExtMasterSecret)
|
||
if (wolfSSL_CTX_DisableExtendedMasterSecret(ctx) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("DisableExtendedMasterSecret failed");
|
||
}
|
||
#endif
|
||
#if defined(HAVE_SUPPORTED_CURVES)
|
||
#if defined(HAVE_CURVE25519)
|
||
if (useX25519) {
|
||
if (wolfSSL_CTX_UseSupportedCurve(ctx, WOLFSSL_ECC_X25519)
|
||
!= WOLFSSL_SUCCESS) {
|
||
err_sys("unable to support X25519");
|
||
}
|
||
}
|
||
#endif /* HAVE_CURVE25519 */
|
||
#if defined(HAVE_CURVE448)
|
||
if (useX448) {
|
||
if (wolfSSL_CTX_UseSupportedCurve(ctx, WOLFSSL_ECC_X448)
|
||
!= WOLFSSL_SUCCESS) {
|
||
err_sys("unable to support X448");
|
||
}
|
||
}
|
||
#endif /* HAVE_CURVE448 */
|
||
#ifdef HAVE_ECC
|
||
if (useSupCurve) {
|
||
#if !defined(NO_ECC_SECP) && \
|
||
(defined(HAVE_ECC384) || defined(HAVE_ALL_CURVES))
|
||
if (wolfSSL_CTX_UseSupportedCurve(ctx, WOLFSSL_ECC_SECP384R1)
|
||
!= WOLFSSL_SUCCESS) {
|
||
err_sys("unable to support secp384r1");
|
||
}
|
||
#endif
|
||
#if !defined(NO_ECC_SECP) && \
|
||
(!defined(NO_ECC256) || defined(HAVE_ALL_CURVES))
|
||
if (wolfSSL_CTX_UseSupportedCurve(ctx, WOLFSSL_ECC_SECP256R1)
|
||
!= WOLFSSL_SUCCESS) {
|
||
err_sys("unable to support secp256r1");
|
||
}
|
||
#endif
|
||
}
|
||
#endif /* HAVE_ECC */
|
||
#ifdef HAVE_FFDHE_2048
|
||
if (useSupCurve) {
|
||
if (wolfSSL_CTX_UseSupportedCurve(ctx, WOLFSSL_FFDHE_2048)
|
||
!= WOLFSSL_SUCCESS) {
|
||
err_sys("unable to support FFDHE 2048");
|
||
}
|
||
}
|
||
#endif
|
||
#endif /* HAVE_SUPPORTED_CURVES */
|
||
|
||
#ifdef WOLFSSL_TLS13
|
||
if (noPskDheKe)
|
||
wolfSSL_CTX_no_dhe_psk(ctx);
|
||
#ifdef HAVE_SUPPORTED_CURVES
|
||
if (onlyPskDheKe)
|
||
wolfSSL_CTX_only_dhe_psk(ctx);
|
||
#endif
|
||
#endif
|
||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_POST_HANDSHAKE_AUTH)
|
||
if (postHandAuth) {
|
||
if (wolfSSL_CTX_allow_post_handshake_auth(ctx) != 0) {
|
||
err_sys("unable to support post handshake auth");
|
||
}
|
||
}
|
||
#endif
|
||
|
||
if (benchmark) {
|
||
((func_args*)args)->return_code =
|
||
ClientBenchmarkConnections(ctx, host, port, dtlsUDP, dtlsSCTP,
|
||
benchmark, resumeSession, useX25519,
|
||
useX448, usePqc, pqcAlg, helloRetry,
|
||
onlyKeyShare, version, earlyData);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
}
|
||
|
||
if (throughput) {
|
||
((func_args*)args)->return_code =
|
||
ClientBenchmarkThroughput(ctx, host, port, dtlsUDP, dtlsSCTP,
|
||
block, throughput, useX25519, useX448,
|
||
usePqc, pqcAlg, exitWithRet, version,
|
||
onlyKeyShare);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
if (((func_args*)args)->return_code != EXIT_SUCCESS && !exitWithRet)
|
||
XEXIT_T(EXIT_SUCCESS);
|
||
else
|
||
goto exit;
|
||
}
|
||
|
||
#if defined(WOLFSSL_MDK_ARM)
|
||
wolfSSL_CTX_set_verify(ctx, WOLFSSL_VERIFY_NONE, NULL);
|
||
#endif
|
||
|
||
#if defined(OPENSSL_EXTRA)
|
||
if (wolfSSL_CTX_get_read_ahead(ctx) != 0) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("bad read ahead default value");
|
||
}
|
||
if (wolfSSL_CTX_set_read_ahead(ctx, 1) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error setting read ahead value");
|
||
}
|
||
#endif
|
||
|
||
#if defined(WOLFSSL_STATIC_MEMORY) && defined(DEBUG_WOLFSSL) && \
|
||
!defined(WOLFSSL_STATIC_MEMORY_LEAN)
|
||
LOG_ERROR("Before creating SSL\n");
|
||
if (wolfSSL_CTX_is_static_memory(ctx, &mem_stats) != 1)
|
||
err_sys("ctx not using static memory");
|
||
if (wolfSSL_PrintStats(&mem_stats) != 1) /* function in test.h */
|
||
err_sys("error printing out memory stats");
|
||
#endif
|
||
|
||
if (doMcast) {
|
||
#ifdef WOLFSSL_MULTICAST
|
||
wolfSSL_CTX_mcast_set_member_id(ctx, mcastID);
|
||
if (wolfSSL_CTX_set_cipher_list(ctx, "WDM-NULL-SHA256")
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("Couldn't set multicast cipher list.");
|
||
}
|
||
#endif
|
||
}
|
||
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
if (pkCallbacks)
|
||
SetupPkCallbacks(ctx);
|
||
#endif
|
||
|
||
ssl = wolfSSL_new(ctx);
|
||
if (ssl == NULL) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("unable to get SSL object");
|
||
}
|
||
|
||
#ifdef WOLFSSL_DUAL_ALG_CERTS
|
||
if (!wolfSSL_UseCKS(ssl, cks_order, sizeof(cks_order))) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("unable to set the CKS order.");
|
||
}
|
||
#endif /* WOLFSSL_DUAL_ALG_CERTS */
|
||
|
||
#ifndef NO_PSK
|
||
if (usePsk) {
|
||
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_TLS13) && \
|
||
defined(TEST_PSK_USE_SESSION)
|
||
SSL_set_psk_use_session_callback(ssl, my_psk_use_session_cb);
|
||
#endif
|
||
}
|
||
#endif
|
||
|
||
#ifndef NO_CERTS
|
||
if (useClientCert && loadCertKeyIntoSSLObj){
|
||
#ifdef NO_FILESYSTEM
|
||
if (wolfSSL_use_certificate_buffer(ssl, client_cert_der_2048,
|
||
sizeof_client_cert_der_2048, SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load client cert buffer");
|
||
}
|
||
#elif !defined(TEST_LOAD_BUFFER)
|
||
if (wolfSSL_use_certificate_chain_file_format(ssl, ourCert, fileFormat)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load client cert file, check file and run from"
|
||
" wolfSSL home dir");
|
||
}
|
||
#else
|
||
load_ssl_buffer(ssl, ourCert, WOLFSSL_CERT_CHAIN);
|
||
#endif
|
||
}
|
||
|
||
if (loadCertKeyIntoSSLObj
|
||
#if defined(HAVE_PK_CALLBACKS) && defined(TEST_PK_PRIVKEY)
|
||
&& !pkCallbacks
|
||
#endif
|
||
) {
|
||
#ifdef NO_FILESYSTEM
|
||
if (wolfSSL_CTX_use_PrivateKey_buffer(ctx, client_key_der_2048,
|
||
sizeof_client_key_der_2048, SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS)
|
||
err_sys("can't load client private key buffer");
|
||
#elif !defined(TEST_LOAD_BUFFER)
|
||
if (wolfSSL_use_PrivateKey_file(ssl, ourKey, fileFormat)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load client private key file, check file and run "
|
||
"from wolfSSL home dir");
|
||
}
|
||
#else
|
||
load_ssl_buffer(ssl, ourKey, WOLFSSL_KEY);
|
||
#endif
|
||
}
|
||
#endif /* !NO_CERTS */
|
||
|
||
#if defined(OPENSSL_EXTRA) || defined(HAVE_SECRET_CALLBACK)
|
||
wolfSSL_KeepArrays(ssl);
|
||
#endif
|
||
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
/* This must be before SetKeyShare */
|
||
if (pkCallbacks) {
|
||
SetupPkCallbackContexts(ssl, &pkCbInfo);
|
||
}
|
||
#endif
|
||
|
||
#if defined(WOLFSSL_STATIC_MEMORY) && defined(DEBUG_WOLFSSL) && \
|
||
!defined(WOLFSSL_STATIC_MEMORY_LEAN)
|
||
LOG_ERROR("After creating SSL\n");
|
||
if (wolfSSL_CTX_is_static_memory(ctx, &mem_stats) != 1)
|
||
err_sys("ctx not using static memory");
|
||
if (wolfSSL_PrintStats(&mem_stats) != 1) /* function in test.h */
|
||
err_sys("error printing out memory stats");
|
||
#endif
|
||
|
||
#if defined(WOLFSSL_TLS13) && defined(HAVE_SUPPORTED_CURVES)
|
||
if (!helloRetry && (version >= 4 || version <= -4)) {
|
||
SetKeyShare(ssl, onlyKeyShare, useX25519, useX448, usePqc,
|
||
pqcAlg, 0);
|
||
}
|
||
else {
|
||
wolfSSL_NoKeyShares(ssl);
|
||
}
|
||
#endif
|
||
|
||
if (doMcast) {
|
||
#ifdef WOLFSSL_MULTICAST
|
||
/* DTLS multicast secret for testing only */
|
||
#define CLI_SRV_RANDOM_SZ 32 /* RAN_LEN (see internal.h) */
|
||
#define PMS_SZ 512 /* ENCRYPT_LEN (see internal.h) */
|
||
byte pms[PMS_SZ]; /* pre master secret */
|
||
byte cr[CLI_SRV_RANDOM_SZ]; /* client random */
|
||
byte sr[CLI_SRV_RANDOM_SZ]; /* server random */
|
||
const byte suite[2] = {0, 0xfe}; /* WDM_WITH_NULL_SHA256 */
|
||
|
||
XMEMSET(pms, 0x23, sizeof(pms));
|
||
XMEMSET(cr, 0xA5, sizeof(cr));
|
||
XMEMSET(sr, 0x5A, sizeof(sr));
|
||
|
||
if (wolfSSL_set_secret(ssl, 1, pms, sizeof(pms), cr, sr, suite)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("unable to set mcast secret");
|
||
}
|
||
#endif
|
||
}
|
||
|
||
#ifdef HAVE_SESSION_TICKET
|
||
wolfSSL_set_SessionTicket_cb(ssl, sessionTicketCB, (void*)"initial session");
|
||
#endif
|
||
|
||
#ifdef HAVE_TRUSTED_CA
|
||
if (trustedCaKeyId) {
|
||
if (wolfSSL_UseTrustedCA(ssl, WOLFSSL_TRUSTED_CA_PRE_AGREED,
|
||
NULL, 0) != WOLFSSL_SUCCESS) {
|
||
err_sys("UseTrustedCA failed");
|
||
}
|
||
}
|
||
#endif
|
||
#ifdef HAVE_ALPN
|
||
if (alpnList != NULL) {
|
||
printf("ALPN accepted protocols list : %s\n", alpnList);
|
||
wolfSSL_UseALPN(ssl, alpnList, (word32)XSTRLEN(alpnList), alpn_opt);
|
||
}
|
||
#endif
|
||
|
||
#if defined(HAVE_CERTIFICATE_STATUS_REQUEST) || \
|
||
defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2)
|
||
if (statusRequest) {
|
||
if (version == 4 &&
|
||
(statusRequest == OCSP_STAPLINGV2 || \
|
||
statusRequest == OCSP_STAPLINGV2_MULTI)) {
|
||
err_sys("Cannot use OCSP Stapling V2 with TLSv1.3");
|
||
}
|
||
|
||
if (wolfSSL_CTX_EnableOCSPStapling(ctx) != WOLFSSL_SUCCESS)
|
||
err_sys("can't enable OCSP Stapling Certificate Manager");
|
||
if (mustStaple) {
|
||
if (wolfSSL_CTX_EnableOCSPMustStaple(ctx) != WOLFSSL_SUCCESS)
|
||
err_sys("can't enable OCSP Must Staple");
|
||
}
|
||
|
||
switch (statusRequest) {
|
||
#ifdef HAVE_CERTIFICATE_STATUS_REQUEST
|
||
case OCSP_STAPLING:
|
||
if (wolfSSL_UseOCSPStapling(ssl, WOLFSSL_CSR_OCSP,
|
||
WOLFSSL_CSR_OCSP_USE_NONCE) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseCertificateStatusRequest failed");
|
||
}
|
||
break;
|
||
#endif
|
||
#ifdef HAVE_CERTIFICATE_STATUS_REQUEST_V2
|
||
case OCSP_STAPLINGV2:
|
||
if (wolfSSL_UseOCSPStaplingV2(ssl,
|
||
WOLFSSL_CSR2_OCSP, WOLFSSL_CSR2_OCSP_USE_NONCE)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseCertificateStatusRequest failed");
|
||
}
|
||
break;
|
||
case OCSP_STAPLINGV2_MULTI:
|
||
if (wolfSSL_UseOCSPStaplingV2(ssl,
|
||
WOLFSSL_CSR2_OCSP_MULTI, 0)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("UseCertificateStatusRequest failed");
|
||
}
|
||
break;
|
||
#endif
|
||
default:
|
||
err_sys("Invalid OCSP Stapling option");
|
||
}
|
||
|
||
wolfSSL_CTX_EnableOCSP(ctx, 0);
|
||
}
|
||
#endif
|
||
|
||
#if !defined(NO_DH) && !defined(WOLFSSL_OLD_PRIME_CHECK) && \
|
||
!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)
|
||
if (!doDhKeyCheck)
|
||
wolfSSL_SetEnableDhKeyTest(ssl, 0);
|
||
#endif
|
||
|
||
#ifdef HAVE_ENCRYPT_THEN_MAC
|
||
if (disallowETM)
|
||
wolfSSL_AllowEncryptThenMac(ssl, 0);
|
||
#endif
|
||
|
||
|
||
tcp_connect(&sockfd, host, port, dtlsUDP, dtlsSCTP, ssl);
|
||
if (wolfSSL_set_fd(ssl, sockfd) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error in setting fd");
|
||
}
|
||
|
||
if (simulateWantWrite) {
|
||
if (dtlsUDP) {
|
||
wolfSSL_SetIOWriteCtx(ssl, (void*)&sockfd);
|
||
udp_connect(&sockfd, host, port);
|
||
}
|
||
}
|
||
|
||
/* STARTTLS */
|
||
if (doSTARTTLS) {
|
||
if (StartTLS_Init(&sockfd) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error during STARTTLS protocol");
|
||
}
|
||
}
|
||
|
||
#if defined(HAVE_CRL) && !defined(NO_FILESYSTEM)
|
||
if (disableCRL == 0 && !useVerifyCb) {
|
||
#if defined(HAVE_IO_TIMEOUT) && defined(HAVE_HTTP_CLIENT)
|
||
wolfIO_SetTimeout(DEFAULT_TIMEOUT_SEC);
|
||
#endif
|
||
|
||
if (wolfSSL_EnableCRL(ssl, WOLFSSL_CRL_CHECKALL) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't enable crl check");
|
||
}
|
||
if (wolfSSL_LoadCRL(ssl, crlPemDir, WOLFSSL_FILETYPE_PEM, 0)
|
||
!= WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't load crl, check crlfile and date validity");
|
||
}
|
||
if (wolfSSL_SetCRL_Cb(ssl, CRL_CallBack) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't set crl callback");
|
||
}
|
||
}
|
||
#endif
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
if (scr) {
|
||
if (wolfSSL_UseSecureRenegotiation(ssl) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't enable secure renegotiation");
|
||
}
|
||
}
|
||
#endif
|
||
#if defined(ATOMIC_USER) && !defined(WOLFSSL_AEAD_ONLY)
|
||
if (atomicUser)
|
||
SetupAtomicUser(ctx, ssl);
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_DTLS_CID
|
||
if (useDtlsCID) {
|
||
ret = wolfSSL_dtls_cid_use(ssl);
|
||
if (ret != WOLFSSL_SUCCESS)
|
||
err_sys("Can't enable DTLS ConnectionID");
|
||
ret = wolfSSL_dtls_cid_set(ssl, (unsigned char*)dtlsCID,
|
||
(word32)XSTRLEN(dtlsCID));
|
||
if (ret != WOLFSSL_SUCCESS)
|
||
err_sys("Can't set DTLS ConnectionID");
|
||
}
|
||
#endif /* WOLFSSL_DTLS_CID */
|
||
|
||
if (matchName && doPeerCheck)
|
||
wolfSSL_check_domain_name(ssl, domain);
|
||
#ifndef WOLFSSL_CALLBACKS
|
||
if (nonBlocking) {
|
||
#ifdef WOLFSSL_DTLS
|
||
if (doDTLS) {
|
||
wolfSSL_dtls_set_using_nonblock(ssl, 1);
|
||
}
|
||
#endif
|
||
tcp_set_nonblocking(&sockfd);
|
||
ret = NonBlockingSSL_Connect(ssl);
|
||
}
|
||
else {
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
if (usePsk && earlyData)
|
||
EarlyData(ctx, ssl, kEarlyMsg, sizeof(kEarlyMsg)-1, buffer);
|
||
#endif
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_connect(ssl);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
}
|
||
#else
|
||
timeoutConnect.tv_sec = DEFAULT_TIMEOUT_SEC;
|
||
timeoutConnect.tv_usec = 0;
|
||
ret = NonBlockingSSL_Connect(ssl); /* will keep retrying on timeout */
|
||
#endif
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
LOG_ERROR("wolfSSL_connect error %d, %s\n", err,
|
||
wolfSSL_ERR_error_string((unsigned long)err, buffer));
|
||
|
||
/* cleanup */
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
CloseSocket(sockfd);
|
||
|
||
if (!exitWithRet)
|
||
err_sys("wolfSSL_connect failed");
|
||
/* see note at top of README */
|
||
/* if you're getting an error here */
|
||
|
||
((func_args*)args)->return_code = err;
|
||
goto exit;
|
||
}
|
||
|
||
showPeerEx(ssl, lng_index);
|
||
showPeerPEM(ssl);
|
||
|
||
/* if the caller requested a particular cipher, check here that either
|
||
* a canonical name of the established cipher matches the requested
|
||
* cipher name, or the requested cipher name is marked as an alias
|
||
* that matches the established cipher.
|
||
*/
|
||
if (cipherList && !useDefCipherList && (! XSTRSTR(cipherList, ":"))) {
|
||
WOLFSSL_CIPHER* established_cipher = wolfSSL_get_current_cipher(ssl);
|
||
byte requested_cipherSuite0, requested_cipherSuite;
|
||
int requested_cipherFlags;
|
||
if (established_cipher &&
|
||
/* don't test for pseudo-ciphers like "ALL" and "DEFAULT". */
|
||
(wolfSSL_get_cipher_suite_from_name(cipherList,
|
||
&requested_cipherSuite0,
|
||
&requested_cipherSuite,
|
||
&requested_cipherFlags) == 0)) {
|
||
word32 established_cipher_id =
|
||
wolfSSL_CIPHER_get_id(established_cipher);
|
||
byte established_cipherSuite0 = (established_cipher_id >> 8) & 0xff;
|
||
byte established_cipherSuite = established_cipher_id & 0xff;
|
||
const char *established_cipher_name =
|
||
wolfSSL_get_cipher_name_from_suite(established_cipherSuite0,
|
||
established_cipherSuite);
|
||
const char *established_cipher_name_iana =
|
||
wolfSSL_get_cipher_name_iana_from_suite(established_cipherSuite0,
|
||
established_cipherSuite);
|
||
|
||
if (established_cipher_name == NULL)
|
||
err_sys("error looking up name of established cipher");
|
||
|
||
if (strcmp(cipherList, established_cipher_name) &&
|
||
((established_cipher_name_iana == NULL) ||
|
||
strcmp(cipherList, established_cipher_name_iana))) {
|
||
if (! (requested_cipherFlags & WOLFSSL_CIPHER_SUITE_FLAG_NAMEALIAS))
|
||
err_sys("Unexpected mismatch between names of requested and established ciphers.");
|
||
else if ((requested_cipherSuite0 != established_cipherSuite0) ||
|
||
(requested_cipherSuite != established_cipherSuite))
|
||
err_sys("Mismatch between IDs of requested and established ciphers.");
|
||
}
|
||
}
|
||
}
|
||
|
||
#if defined(HAVE_OCSP) && !defined(NO_ASN_TIME)
|
||
#ifdef HAVE_STRFTIME
|
||
{
|
||
struct tm tm;
|
||
char date[32];
|
||
ret = wolfSSL_get_ocsp_producedDate_tm(ssl, &tm);
|
||
if ((ret == 0) && (strftime(date, sizeof date, "%Y-%m-%d %H:%M:%S %z", &tm) > 0))
|
||
printf("OCSP response timestamp: %s\n", date);
|
||
}
|
||
#else
|
||
{
|
||
byte date[MAX_DATE_SIZE];
|
||
int asn_date_format;
|
||
ret = wolfSSL_get_ocsp_producedDate(ssl, date, sizeof date, &asn_date_format);
|
||
if (ret == 0)
|
||
printf("OCSP response timestamp: %s (ASN.1 type %d)\n", (char *)date, asn_date_format);
|
||
}
|
||
#endif
|
||
#endif
|
||
|
||
#if defined(OPENSSL_EXTRA) || defined(HAVE_SECRET_CALLBACK)
|
||
printf("Session timeout set to %ld seconds\n", wolfSSL_get_timeout(ssl));
|
||
{
|
||
byte* rnd;
|
||
byte* pt;
|
||
size_t size;
|
||
|
||
/* get size of buffer then print */
|
||
size = wolfSSL_get_client_random(NULL, NULL, 0);
|
||
if (size == 0) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error getting client random buffer size");
|
||
}
|
||
|
||
rnd = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
if (rnd == NULL) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error creating client random buffer");
|
||
}
|
||
|
||
size = wolfSSL_get_client_random(ssl, rnd, size);
|
||
if (size == 0) {
|
||
XFREE(rnd, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error getting client random buffer");
|
||
}
|
||
|
||
printf("Client Random : ");
|
||
for (pt = rnd; pt < rnd + size; pt++) printf("%02X", *pt);
|
||
printf("\n");
|
||
XFREE(rnd, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
|
||
}
|
||
#endif
|
||
|
||
#if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && (defined(HAVE_STUNNEL) || \
|
||
defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY) || \
|
||
defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_OPENSSH)))
|
||
#if !defined(NO_SESSION_CACHE) && \
|
||
(defined(HAVE_SESSION_TICKET) || defined(SESSION_CERTS)) && \
|
||
!defined(NO_FILESYSTEM)
|
||
#ifndef NO_BIO
|
||
/* print out session to stdout */
|
||
{
|
||
WOLFSSL_BIO* bio = wolfSSL_BIO_new_fp(stdout, BIO_NOCLOSE);
|
||
if (bio != NULL) {
|
||
if (wolfSSL_SESSION_print(bio, wolfSSL_get_session(ssl)) !=
|
||
WOLFSSL_SUCCESS) {
|
||
wolfSSL_BIO_printf(bio, "BIO error printing session\n");
|
||
}
|
||
}
|
||
wolfSSL_BIO_free(bio);
|
||
}
|
||
#endif /* !NO_BIO */
|
||
#endif
|
||
#endif
|
||
|
||
if (doSTARTTLS && starttlsProt != NULL) {
|
||
if (XSTRCMP(starttlsProt, "smtp") == 0) {
|
||
if (SMTP_Shutdown(ssl, wc_shutdown) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error closing STARTTLS connection");
|
||
}
|
||
}
|
||
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
|
||
((func_args*)args)->return_code = 0;
|
||
WOLFSSL_RETURN_FROM_THREAD(0);
|
||
}
|
||
|
||
#ifdef HAVE_ALPN
|
||
if (alpnList != NULL) {
|
||
char *protocol_name = NULL;
|
||
word16 protocol_nameSz = 0;
|
||
|
||
err = wolfSSL_ALPN_GetProtocol(ssl, &protocol_name, &protocol_nameSz);
|
||
if (err == WOLFSSL_SUCCESS)
|
||
printf("Received ALPN protocol : %s (%d)\n",
|
||
protocol_name, protocol_nameSz);
|
||
else if (err == WC_NO_ERR_TRACE(WOLFSSL_ALPN_NOT_FOUND))
|
||
printf("No ALPN response received (no match with server)\n");
|
||
else
|
||
printf("Getting ALPN protocol name failed\n");
|
||
}
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_DTLS_CID
|
||
if (useDtlsCID && wolfSSL_dtls_cid_is_enabled(ssl)) {
|
||
unsigned char receivedCID[DTLS_CID_BUFFER_SIZE];
|
||
unsigned int receivedCIDSz;
|
||
|
||
printf("CID extension was negotiated\n");
|
||
ret = wolfSSL_dtls_cid_get_tx_size(ssl, &receivedCIDSz);
|
||
if (ret == WOLFSSL_SUCCESS && receivedCIDSz > 0) {
|
||
ret = wolfSSL_dtls_cid_get_tx(ssl, receivedCID,
|
||
DTLS_CID_BUFFER_SIZE - 1);
|
||
if (ret != WOLFSSL_SUCCESS)
|
||
err_sys("Can't get negotiated DTLS CID\n");
|
||
|
||
printf("Sending CID is ");
|
||
printBuffer(receivedCID, receivedCIDSz);
|
||
printf("\n");
|
||
}
|
||
else {
|
||
printf("other peer provided empty CID\n");
|
||
}
|
||
}
|
||
#endif /* WOLFSSL_DTLS_CID */
|
||
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
if (scr && forceScr) {
|
||
if (nonBlocking) {
|
||
if (!resumeScr) {
|
||
if (wolfSSL_Rehandshake(ssl) != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
if (err == WOLFSSL_ERROR_WANT_READ ||
|
||
err == WOLFSSL_ERROR_WANT_WRITE) {
|
||
if (scrAppData) {
|
||
ret = ClientWrite(ssl,
|
||
"msg sent during renegotiation",
|
||
sizeof("msg sent during renegotiation") - 1,
|
||
"", 1);
|
||
}
|
||
else {
|
||
ret = 0;
|
||
}
|
||
if (ret != 0) {
|
||
ret = WOLFSSL_FAILURE;
|
||
}
|
||
else {
|
||
do {
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
if (err == WC_NO_ERR_TRACE(APP_DATA_READY)) {
|
||
if (wolfSSL_read(ssl, reply,
|
||
sizeof(reply)-1) < 0) {
|
||
err_sys("APP DATA should be present "
|
||
"but error returned");
|
||
}
|
||
printf("Received message during "
|
||
"renegotiation: %s\n", reply);
|
||
}
|
||
err = 0;
|
||
if ((ret = wolfSSL_connect(ssl))
|
||
!= WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, ret);
|
||
}
|
||
} while (ret != WOLFSSL_SUCCESS &&
|
||
(err == WOLFSSL_ERROR_WANT_READ ||
|
||
err == WOLFSSL_ERROR_WANT_WRITE ||
|
||
err == WC_NO_ERR_TRACE(APP_DATA_READY) ||
|
||
err == WC_NO_ERR_TRACE(WC_PENDING_E)));
|
||
}
|
||
|
||
if (ret == WOLFSSL_SUCCESS) {
|
||
printf("NON-BLOCKING RENEGOTIATION SUCCESSFUL\n");
|
||
}
|
||
}
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
LOG_ERROR("wolfSSL_Rehandshake error %d, %s\n", err,
|
||
wolfSSL_ERR_error_string(err, buffer));
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("non-blocking wolfSSL_Rehandshake failed");
|
||
}
|
||
}
|
||
}
|
||
else {
|
||
LOG_ERROR("not doing secure resumption with non-blocking");
|
||
}
|
||
} else {
|
||
if (!resumeScr) {
|
||
printf("Beginning secure renegotiation.\n");
|
||
if ((ret = wolfSSL_Rehandshake(ssl)) != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
while (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
err = 0;
|
||
ret = wolfSSL_negotiate(ssl);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
}
|
||
}
|
||
#endif
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
printf("err = %d, %s\n", err,
|
||
wolfSSL_ERR_error_string(err, buffer));
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("wolfSSL_Rehandshake failed");
|
||
}
|
||
}
|
||
else {
|
||
printf("RENEGOTIATION SUCCESSFUL\n");
|
||
}
|
||
}
|
||
else {
|
||
printf("Beginning secure resumption.\n");
|
||
if ((ret = wolfSSL_SecureResume(ssl)) != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
while (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
err = 0;
|
||
ret = wolfSSL_negotiate(ssl);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(ssl, 0);
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(ssl, WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
}
|
||
}
|
||
#endif
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
printf("err = %d, %s\n", err,
|
||
wolfSSL_ERR_error_string(err, buffer));
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("wolfSSL_SecureResume failed");
|
||
}
|
||
}
|
||
else {
|
||
printf("SECURE RESUMPTION SUCCESSFUL\n");
|
||
}
|
||
}
|
||
}
|
||
}
|
||
#endif /* HAVE_SECURE_RENEGOTIATION */
|
||
|
||
XMEMSET(msg, 0, sizeof(msg));
|
||
if (sendGET) {
|
||
printf("SSL connect ok, sending GET...\n");
|
||
|
||
msgSz = (int)XSTRLEN(kHttpGetMsg);
|
||
XMEMCPY(msg, kHttpGetMsg, (size_t)msgSz);
|
||
}
|
||
else {
|
||
msgSz = (int)XSTRLEN(kHelloMsg);
|
||
XMEMCPY(msg, kHelloMsg, (size_t)msgSz);
|
||
}
|
||
|
||
/* allow some time for exporting the session */
|
||
#ifdef WOLFSSL_SESSION_EXPORT_DEBUG
|
||
TEST_DELAY();
|
||
#endif /* WOLFSSL_SESSION_EXPORT_DEBUG */
|
||
|
||
#ifdef WOLFSSL_SRTP
|
||
if (dtlsSrtpProfiles != NULL) {
|
||
err = client_srtp_test(ssl, (func_args*)args);
|
||
if (err != 0) {
|
||
if (exitWithRet) {
|
||
((func_args*)args)->return_code = err;
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
goto exit;
|
||
}
|
||
/* else */
|
||
err_sys("SRTP check failed");
|
||
}
|
||
}
|
||
#endif /* WOLFSSL_SRTP */
|
||
|
||
#ifdef WOLFSSL_TLS13
|
||
if (updateKeysIVs)
|
||
wolfSSL_update_keys(ssl);
|
||
#endif
|
||
|
||
err = ClientWriteRead(ssl, msg, msgSz, reply, sizeof(reply)-1, 1, "",
|
||
exitWithRet);
|
||
if (exitWithRet && (err != 0)) {
|
||
((func_args*)args)->return_code = err;
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
goto exit;
|
||
}
|
||
|
||
#if defined(WOLFSSL_TLS13)
|
||
if (updateKeysIVs || postHandAuth)
|
||
(void)ClientWrite(ssl, msg, msgSz, "", 0);
|
||
#endif
|
||
|
||
#if defined(HAVE_SESSION_TICKET)
|
||
while (waitTicket == 1) {
|
||
unsigned char ticketBuf[SESSION_TICKET_LEN];
|
||
int zeroReturn = 0;
|
||
word32 size;
|
||
|
||
(void)zeroReturn;
|
||
size = sizeof(ticketBuf);
|
||
err = wolfSSL_get_SessionTicket(ssl, ticketBuf, &size);
|
||
if (err < 0)
|
||
err_sys("wolfSSL_get_SessionTicket failed");
|
||
|
||
if (size == 0) {
|
||
err = process_handshake_messages(ssl, !nonBlocking, &zeroReturn);
|
||
if (err < 0)
|
||
err_sys("error waiting for session ticket ");
|
||
}
|
||
else {
|
||
waitTicket = 0;
|
||
}
|
||
}
|
||
#endif
|
||
|
||
#ifndef NO_SESSION_CACHE
|
||
if (resumeSession) {
|
||
session = wolfSSL_get1_session(ssl);
|
||
}
|
||
#endif
|
||
|
||
#if !defined(NO_SESSION_CACHE) && (defined(OPENSSL_EXTRA) || \
|
||
defined(HAVE_EXT_CACHE))
|
||
if (session != NULL && resumeSession) {
|
||
flatSessionSz = wolfSSL_i2d_SSL_SESSION(session, NULL);
|
||
if (flatSessionSz != 0) {
|
||
int checkSz = wolfSSL_i2d_SSL_SESSION(session, &flatSession);
|
||
if (flatSession == NULL)
|
||
err_sys("error creating flattened session buffer");
|
||
if (checkSz != flatSessionSz) {
|
||
XFREE(flatSession, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
err_sys("flat session size check failure");
|
||
}
|
||
/* using heap based flat session, free original session */
|
||
wolfSSL_SESSION_free(session);
|
||
session = NULL;
|
||
}
|
||
}
|
||
#endif
|
||
|
||
ret = wolfSSL_shutdown(ssl);
|
||
if (wc_shutdown && ret == WOLFSSL_SHUTDOWN_NOT_DONE) {
|
||
while (tcp_select(wolfSSL_get_fd(ssl), DEFAULT_TIMEOUT_SEC) ==
|
||
TEST_RECV_READY) {
|
||
ret = wolfSSL_shutdown(ssl); /* bidirectional shutdown */
|
||
if (ret == WOLFSSL_SUCCESS) {
|
||
printf("Bidirectional shutdown complete\n");
|
||
break;
|
||
}
|
||
else if (ret != WOLFSSL_SHUTDOWN_NOT_DONE) {
|
||
LOG_ERROR("Bidirectional shutdown failed\n");
|
||
break;
|
||
}
|
||
}
|
||
if (ret != WOLFSSL_SUCCESS)
|
||
LOG_ERROR("Bidirectional shutdown failed\n");
|
||
}
|
||
#if defined(ATOMIC_USER) && !defined(WOLFSSL_AEAD_ONLY)
|
||
if (atomicUser)
|
||
FreeAtomicUser(ssl);
|
||
#endif
|
||
|
||
/* display collected statistics */
|
||
#if defined(WOLFSSL_STATIC_MEMORY) && !defined(WOLFSSL_STATIC_MEMORY_LEAN)
|
||
if (wolfSSL_is_static_memory(ssl, &ssl_stats) != 1)
|
||
err_sys("static memory was not used with ssl");
|
||
|
||
LOG_ERROR("\nprint off SSL memory stats\n");
|
||
LOG_ERROR("*** This is memory state before wolfSSL_free is called\n");
|
||
wolfSSL_PrintStatsConn(&ssl_stats);
|
||
#endif
|
||
|
||
wolfSSL_free(ssl); ssl = NULL;
|
||
CloseSocket(sockfd);
|
||
|
||
#ifndef NO_SESSION_CACHE
|
||
if (resumeSession) {
|
||
sslResume = wolfSSL_new(ctx);
|
||
if (sslResume == NULL) {
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("unable to get SSL object");
|
||
}
|
||
|
||
#if !defined(NO_DH) && !defined(WOLFSSL_OLD_PRIME_CHECK) && \
|
||
!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)
|
||
if (!doDhKeyCheck)
|
||
wolfSSL_SetEnableDhKeyTest(sslResume, 0);
|
||
#endif
|
||
#ifdef HAVE_PK_CALLBACKS
|
||
if (pkCallbacks) {
|
||
SetupPkCallbackContexts(sslResume, &pkCbInfo);
|
||
}
|
||
#endif
|
||
|
||
if (dtlsUDP) {
|
||
TEST_DELAY();
|
||
}
|
||
tcp_connect(&sockfd, host, port, dtlsUDP, dtlsSCTP, sslResume);
|
||
if (wolfSSL_set_fd(sslResume, sockfd) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(sslResume); sslResume = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("error in setting fd");
|
||
}
|
||
if (simulateWantWrite) {
|
||
if (dtlsUDP) {
|
||
wolfSSL_SetIOWriteCtx(ssl, (void*)&sockfd);
|
||
udp_connect(&sockfd, host, port);
|
||
}
|
||
}
|
||
#ifdef HAVE_ALPN
|
||
if (alpnList != NULL) {
|
||
printf("ALPN accepted protocols list : %s\n", alpnList);
|
||
wolfSSL_UseALPN(sslResume, alpnList, (word32)XSTRLEN(alpnList),
|
||
alpn_opt);
|
||
}
|
||
#endif
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
if (scr) {
|
||
if (wolfSSL_UseSecureRenegotiation(sslResume) != WOLFSSL_SUCCESS) {
|
||
wolfSSL_free(sslResume); sslResume = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("can't enable secure renegotiation");
|
||
}
|
||
}
|
||
#endif
|
||
|
||
#if !defined(NO_SESSION_CACHE) && (defined(OPENSSL_EXTRA) || \
|
||
defined(HAVE_EXT_CACHE))
|
||
if (flatSession) {
|
||
const byte* constFlatSession = flatSession;
|
||
session = wolfSSL_d2i_SSL_SESSION(NULL,
|
||
&constFlatSession, flatSessionSz);
|
||
}
|
||
#endif
|
||
|
||
wolfSSL_set_session(sslResume, session);
|
||
|
||
#if !defined(NO_SESSION_CACHE) && (defined(OPENSSL_EXTRA) || \
|
||
defined(HAVE_EXT_CACHE))
|
||
XFREE(flatSession, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||
#endif
|
||
wolfSSL_SESSION_free(session);
|
||
session = NULL;
|
||
|
||
#ifdef HAVE_SESSION_TICKET
|
||
wolfSSL_set_SessionTicket_cb(sslResume, sessionTicketCB,
|
||
(void*)"resumed session");
|
||
#endif
|
||
|
||
#ifndef WOLFSSL_CALLBACKS
|
||
if (nonBlocking) {
|
||
#ifdef WOLFSSL_DTLS
|
||
if (doDTLS) {
|
||
wolfSSL_dtls_set_using_nonblock(sslResume, 1);
|
||
}
|
||
#endif
|
||
tcp_set_nonblocking(&sockfd);
|
||
ret = NonBlockingSSL_Connect(sslResume);
|
||
}
|
||
else {
|
||
#ifdef WOLFSSL_EARLY_DATA
|
||
#ifndef HAVE_SESSION_TICKET
|
||
if (!usePsk) {
|
||
}
|
||
else
|
||
#endif
|
||
if (earlyData) {
|
||
EarlyData(ctx, sslResume, kEarlyMsg, sizeof(kEarlyMsg)-1, buffer);
|
||
}
|
||
#endif
|
||
do {
|
||
err = 0; /* reset error */
|
||
ret = wolfSSL_connect(sslResume);
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(sslResume, 0);
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
if (err == WC_NO_ERR_TRACE(WC_PENDING_E)) {
|
||
ret = wolfSSL_AsyncPoll(sslResume,
|
||
WOLF_POLL_FLAG_CHECK_HW);
|
||
if (ret < 0) break;
|
||
}
|
||
#endif
|
||
}
|
||
} while (err == WC_NO_ERR_TRACE(WC_PENDING_E));
|
||
}
|
||
#else
|
||
timeoutConnect.tv_sec = DEFAULT_TIMEOUT_SEC;
|
||
timeoutConnect.tv_usec = 0;
|
||
ret = NonBlockingSSL_Connect(sslResume); /* will keep retrying on timeout */
|
||
#endif
|
||
if (ret != WOLFSSL_SUCCESS) {
|
||
LOG_ERROR("wolfSSL_connect resume error %d, %s\n", err,
|
||
wolfSSL_ERR_error_string((unsigned long)err, buffer));
|
||
wolfSSL_free(sslResume); sslResume = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("wolfSSL_connect resume failed");
|
||
}
|
||
|
||
showPeerEx(sslResume, lng_index);
|
||
showPeerPEM(sslResume);
|
||
|
||
if (wolfSSL_session_reused(sslResume))
|
||
printf("reused session id\n");
|
||
else
|
||
LOG_ERROR("didn't reuse session id!!!\n");
|
||
|
||
#ifdef HAVE_ALPN
|
||
if (alpnList != NULL) {
|
||
char *protocol_name = NULL;
|
||
word16 protocol_nameSz = 0;
|
||
|
||
printf("Sending ALPN accepted list : %s\n", alpnList);
|
||
err = wolfSSL_ALPN_GetProtocol(sslResume, &protocol_name,
|
||
&protocol_nameSz);
|
||
if (err == WOLFSSL_SUCCESS)
|
||
printf("Received ALPN protocol : %s (%d)\n",
|
||
protocol_name, protocol_nameSz);
|
||
else if (err == WC_NO_ERR_TRACE(WOLFSSL_ALPN_NOT_FOUND))
|
||
printf("Not received ALPN response (no match with server)\n");
|
||
else
|
||
printf("Getting ALPN protocol name failed\n");
|
||
}
|
||
#endif
|
||
|
||
/* allow some time for exporting the session */
|
||
#ifdef WOLFSSL_SESSION_EXPORT_DEBUG
|
||
TEST_DELAY();
|
||
#endif /* WOLFSSL_SESSION_EXPORT_DEBUG */
|
||
|
||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||
if (scr && forceScr) {
|
||
if (nonBlocking) {
|
||
printf("not doing secure renegotiation on example with"
|
||
" nonblocking yet\n");
|
||
} else {
|
||
if (!resumeScr) {
|
||
printf("Beginning secure renegotiation.\n");
|
||
if (wolfSSL_Rehandshake(sslResume) != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(sslResume, 0);
|
||
LOG_ERROR("err = %d, %s\n", err,
|
||
wolfSSL_ERR_error_string(err, buffer));
|
||
wolfSSL_free(sslResume); sslResume = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("wolfSSL_Rehandshake failed");
|
||
}
|
||
else {
|
||
printf("RENEGOTIATION SUCCESSFUL\n");
|
||
}
|
||
}
|
||
else {
|
||
printf("Beginning secure resumption.\n");
|
||
if (wolfSSL_SecureResume(sslResume) != WOLFSSL_SUCCESS) {
|
||
err = wolfSSL_get_error(sslResume, 0);
|
||
LOG_ERROR("err = %d, %s\n", err,
|
||
wolfSSL_ERR_error_string(err, buffer));
|
||
wolfSSL_free(sslResume); sslResume = NULL;
|
||
CloseSocket(sockfd);
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
err_sys("wolfSSL_SecureResume failed");
|
||
}
|
||
else {
|
||
printf("SECURE RESUMPTION SUCCESSFUL\n");
|
||
}
|
||
}
|
||
}
|
||
}
|
||
#endif /* HAVE_SECURE_RENEGOTIATION */
|
||
|
||
XMEMSET(msg, 0, sizeof(msg));
|
||
if (sendGET) {
|
||
msgSz = (int)XSTRLEN(kHttpGetMsg);
|
||
XMEMCPY(msg, kHttpGetMsg, (size_t)msgSz);
|
||
}
|
||
else {
|
||
msgSz = (int)XSTRLEN(kResumeMsg);
|
||
XMEMCPY(msg, kResumeMsg, (size_t)msgSz);
|
||
}
|
||
|
||
(void)ClientWriteRead(sslResume, msg, msgSz, reply, sizeof(reply)-1,
|
||
sendGET, " resume", 0);
|
||
|
||
ret = wolfSSL_shutdown(sslResume);
|
||
if (wc_shutdown && ret == WOLFSSL_SHUTDOWN_NOT_DONE)
|
||
wolfSSL_shutdown(sslResume); /* bidirectional shutdown */
|
||
|
||
/* display collected statistics */
|
||
#if defined(WOLFSSL_STATIC_MEMORY) && !defined(WOLFSSL_STATIC_MEMORY_LEAN)
|
||
if (wolfSSL_is_static_memory(sslResume, &ssl_stats) != 1)
|
||
err_sys("static memory was not used with ssl");
|
||
|
||
LOG_ERROR("\nprint off SSLresume memory stats\n");
|
||
LOG_ERROR("*** This is memory state before wolfSSL_free is called\n");
|
||
wolfSSL_PrintStatsConn(&ssl_stats);
|
||
#endif
|
||
|
||
wolfSSL_free(sslResume); sslResume = NULL;
|
||
CloseSocket(sockfd);
|
||
}
|
||
#endif /* !NO_SESSION_CACHE */
|
||
|
||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||
|
||
((func_args*)args)->return_code = 0;
|
||
|
||
exit:
|
||
|
||
#ifdef WOLFSSL_WOLFSENTRY_HOOKS
|
||
wolfsentry_ret =
|
||
wolfsentry_shutdown(WOLFSENTRY_CONTEXT_ARGS_OUT_EX4(&wolfsentry, NULL));
|
||
if (wolfsentry_ret < 0) {
|
||
LOG_ERROR(
|
||
"wolfsentry_shutdown() returned " WOLFSENTRY_ERROR_FMT "\n",
|
||
WOLFSENTRY_ERROR_FMT_ARGS(wolfsentry_ret));
|
||
}
|
||
#endif
|
||
|
||
#ifdef WOLFSSL_ASYNC_CRYPT
|
||
wolfAsync_DevClose(&devId);
|
||
#endif
|
||
|
||
#if defined(HAVE_ECC) && defined(FP_ECC) && defined(HAVE_THREAD_LS) \
|
||
&& defined(HAVE_STACK_SIZE)
|
||
wc_ecc_fp_free(); /* free per thread cache */
|
||
#endif
|
||
|
||
/* There are use cases when these assignments are not read. To avoid
|
||
* potential confusion those warnings have been handled here.
|
||
*/
|
||
(void) useClientCert;
|
||
(void) verifyCert;
|
||
(void) ourCert;
|
||
(void) ourKey;
|
||
(void) useVerifyCb;
|
||
(void) customVerifyCert;
|
||
|
||
WOLFSSL_RETURN_FROM_THREAD(0);
|
||
}
|
||
|
||
#endif /* !NO_WOLFSSL_CLIENT && !NO_TLS */
|
||
|
||
|
||
/* so overall tests can pull in test function */
|
||
#ifndef NO_MAIN_DRIVER
|
||
|
||
int main(int argc, char** argv)
|
||
{
|
||
func_args args;
|
||
|
||
StartTCP();
|
||
|
||
#if defined(WOLFSSL_SRTP) && defined(WOLFSSL_COND)
|
||
args.srtp_helper = NULL;
|
||
#endif
|
||
args.argc = argc;
|
||
args.argv = argv;
|
||
args.return_code = 0;
|
||
|
||
#if defined(DEBUG_WOLFSSL) && !defined(WOLFSSL_MDK_SHELL) && !defined(STACK_TRAP)
|
||
wolfSSL_Debugging_ON();
|
||
#endif
|
||
wolfSSL_Init();
|
||
ChangeToWolfRoot();
|
||
|
||
#if !defined(NO_WOLFSSL_CLIENT) && !defined(NO_TLS)
|
||
#ifdef HAVE_STACK_SIZE
|
||
StackSizeCheck(&args, client_test);
|
||
#else
|
||
client_test(&args);
|
||
#endif
|
||
#else
|
||
fprintf(stderr, "Client not compiled in!\n");
|
||
#endif
|
||
wolfSSL_Cleanup();
|
||
|
||
#ifdef HAVE_WNR
|
||
if (wc_FreeNetRandom() < 0)
|
||
err_sys("Failed to free netRandom context");
|
||
#endif /* HAVE_WNR */
|
||
|
||
return args.return_code;
|
||
}
|
||
|
||
int myoptind = 0;
|
||
char* myoptarg = NULL;
|
||
|
||
#endif /* NO_MAIN_DRIVER */
|