aboutsummaryrefslogtreecommitdiffstats
path: root/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c
diff options
context:
space:
mode:
authoredolomb <none@example.com>2018-04-11 16:31:47 +0000
committeredolomb <none@example.com>2018-04-11 16:31:47 +0000
commite260cc6448a8c4d8bb150b46364269d5b76798ec (patch)
treebe05f73b43585650573b49eaa2baa6a5463caa3e /demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c
parentfcdf0394ed7601627d17e4262076c9e2dd4cfa59 (diff)
downloadChibiOS-e260cc6448a8c4d8bb150b46364269d5b76798ec.tar.gz
ChibiOS-e260cc6448a8c4d8bb150b46364269d5b76798ec.tar.bz2
ChibiOS-e260cc6448a8c4d8bb150b46364269d5b76798ec.zip
HTTPS SEC and NSEC demos
git-svn-id: svn://svn.code.sf.net/p/chibios/svn/trunk@11881 110e8d01-0319-4d1e-a829-52ad28d1bb01
Diffstat (limited to 'demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c')
-rwxr-xr-xdemos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c244
1 files changed, 244 insertions, 0 deletions
diff --git a/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c b/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c
new file mode 100755
index 000000000..4aebd085d
--- /dev/null
+++ b/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-HTTPS-SEC/main.c
@@ -0,0 +1,244 @@
+/*
+ ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+
+#include "ch.h"
+#include "hal.h"
+#include <ctype.h>
+
+#include "chtssi.h"
+#include "proxies/tssockstub.h"
+#include "wolfssl_chibios.h"
+#include "rt_test_root.h"
+#include "oslib_test_root.h"
+#include "chprintf.h"
+//#include <stdio.h>
+#include <string.h>
+
+#define CONFIG_RESOURCE "/"
+#define CONFIG_WEBSITE "www.howsmyssl.com"
+
+#define WEB_PORT "443"
+
+/* HTTP request */
+static const char *REQUEST = "GET "CONFIG_RESOURCE" HTTP/1.0\r\n"
+ "Host: "CONFIG_WEBSITE"\r\n"
+ "User-Agent: SAMA5D2\r\n"
+ "\r\n";
+
+#define SERVER_IP_ADDRESS "104.196.190.195"
+#define SERVER_PORT_NUM 443
+
+#define MAX_SSL_BUF 2000
+static uint8_t ssl_recv_buffer[MAX_SSL_BUF];
+
+static struct sockaddr_in ra;
+static WOLFSSL_CTX* ctx;
+static WOLFSSL* ssl;
+static WOLFSSL_METHOD* method;
+
+int httpsexample(void) {
+
+ /* create a new socket */
+ int s = socket(AF_INET, SOCK_STREAM, 0);
+
+ if(s < 0) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to allocate a new socket\n\r");
+ return 0;
+ }
+
+ chprintf((BaseSequentialStream *)&SD1, "Socket allocated, id=%d\n\r", s);
+
+ memset(&ra, 0, sizeof(struct sockaddr_in));
+ ra.sin_len = sizeof(ra);
+ ra.sin_family = AF_INET;
+ ra.sin_port = htons(SERVER_PORT_NUM);
+ ra.sin_addr.s_addr = inet_addr(SERVER_IP_ADDRESS);
+
+ /* connect to the specified server */
+ int result = connect(s, (struct sockaddr *)&ra,
+ sizeof (struct sockaddr_in));
+ if(result != 0) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to connect to the target website\n\r");
+ close(s);
+ return 0;
+ }
+
+ chprintf((BaseSequentialStream *)&SD1, "Connected to the target website\n\r");
+
+ /* initialize wolfssl library */
+ wolfSSL_Init();
+ method = wolfTLSv1_2_client_method(); /* use TLS v1.2 */
+
+ /* make new ssl context */
+ if ((ctx = wolfSSL_CTX_new(method)) == NULL) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_CTX_new error\n\r");
+ close(s);
+ return 0;
+ }
+
+ wolfSSL_SetIORecv(ctx, wolfssl_recv_cb) ;
+ wolfSSL_SetIOSend(ctx, wolfssl_send_cb) ;
+
+ /* Add cert to ctx */
+ int e = 0;
+#if 0
+ e = wolfSSL_CTX_load_verify_buffer(ctx, client_cert, client_cert_len, SSL_FILETYPE_ASN1);
+ if (e != SSL_SUCCESS) {
+ chprintf((BaseSequentialStream *)&SD1, "Error loading client certs\n\r");
+ close(s);
+ return 0;
+ }
+#endif
+ /* TODO: delete this line */
+ wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
+
+ /* make new wolfSSL struct */
+ if ((ssl = wolfSSL_new(ctx)) == NULL) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_new error\n\r");
+ close(s);
+ return 0;
+ }
+
+ /* Connect wolfssl to the socket, server, then send message */
+ e = wolfSSL_set_fd(ssl, s);
+ if (e != SSL_SUCCESS) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_set_fd error\n\r");
+ close(s);
+ return 0;
+ }
+
+ e = wolfSSL_connect(ssl);
+ if (e != SSL_SUCCESS) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_connect error\n\r");
+ close(s);
+ return 0;
+ }
+
+ /* send the request */
+ result = wolfSSL_write(ssl, REQUEST, strlen(REQUEST));
+ if(result < 0) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to send the HTTP request\r\n");
+ close(s);
+ return 0;
+ }
+ chprintf((BaseSequentialStream *)&SD1, "HTTP request sent\n\r");
+
+ /* print the response */
+ chprintf((BaseSequentialStream *)&SD1, "HTTP response:\n\r");
+ chprintf((BaseSequentialStream *)&SD1,"--------------------------------------------------------------------------------\n\r");
+ int r;
+ do {
+ memset(ssl_recv_buffer, 0, MAX_SSL_BUF);
+ r = wolfSSL_read(ssl, ssl_recv_buffer, MAX_SSL_BUF - 1);
+ chprintf((BaseSequentialStream *)&SD1,"%s\n\r",ssl_recv_buffer);
+ } while(r > 0);
+ chprintf((BaseSequentialStream *)&SD1, "--------------------------------------------------------------------------------\n\r");
+
+ /* frees all data before client termination */
+ wolfSSL_free(ssl);
+ wolfSSL_CTX_free(ctx);
+ wolfSSL_Cleanup();
+
+// freeaddrinfo(res);
+ close(s);
+ chprintf((BaseSequentialStream *)&SD1, "Socket closed\n\r");
+
+ return 1;
+}
+
+/*
+ * One thread that run the https example.
+ */
+static THD_WORKING_AREA(waThreadHttps, 2048);
+static THD_FUNCTION(ThreadHttps, arg) {
+ (void)arg;
+
+ tsWaitStubSkelReady();
+ chThdSleepMilliseconds(5000);
+ while (true) {
+ httpsexample();
+ chThdSleepMilliseconds(500);
+ }
+}
+
+/*
+ * LED blinker thread, times are in milliseconds.
+ */
+static THD_WORKING_AREA(waThread1, 512);
+static THD_FUNCTION(Thread1, arg) {
+
+ (void)arg;
+ chRegSetThreadName("blinker");
+
+ while (true) {
+ palToggleLine(LINE_LED_BLUE);
+ chThdSleepMilliseconds(80);
+ palToggleLine(LINE_LED_BLUE);
+ chThdSleepMilliseconds(120);
+ palToggleLine(LINE_LED_BLUE);
+ chThdSleepMilliseconds(120);
+ palToggleLine(LINE_LED_BLUE);
+ chThdSleepMilliseconds(120);
+ palToggleLine(LINE_LED_BLUE);
+ chThdSleepMilliseconds(160);
+ palToggleLine(LINE_LED_BLUE);
+ chThdSleepMilliseconds(600);
+ }
+}
+
+static const SerialConfig sdcfg = {
+ 115200,
+ 0,
+ UART_MR_PAR_NO
+};
+
+/*
+ * Application entry point.
+ */
+int main(void) {
+
+ /*
+ * System initializations.
+ * - HAL initialization, this also initializes the configured device drivers
+ * and performs the board-specific initializations.
+ * - Kernel initialization, the main() function becomes a thread and the
+ * RTOS is active.
+ * The foreign interrupts are disabled up to the trampoline in the non secure world
+ */
+ halInit();
+ chSysInit();
+
+ /*
+ * Activates the serial driver 0 using the driver default configuration.
+ */
+ sdStart(&SD1, &sdcfg);
+
+ /*
+ * Creates the blinker thread (and any other ancillary thread).
+ */
+ chThdCreateStatic(waThread1, sizeof waThread1, NORMALPRIO, Thread1, NULL);
+ chThdCreateStatic(waThreadHttps, sizeof waThreadHttps, NORMALPRIO+1, ThreadHttps, NULL);
+
+ /*
+ * System initializations.
+ * - TSSI initialization, the trusted services are created and started.
+ * Lastly, the thread "main" becomes the non secure execution environment.
+ */
+ tssiInit();
+ /*
+ * It never goes here
+ */
+}