aboutsummaryrefslogtreecommitdiffstats
path: root/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-LWIP-HTTPS-CLIENT-SNI/web/web.c
diff options
context:
space:
mode:
Diffstat (limited to 'demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-LWIP-HTTPS-CLIENT-SNI/web/web.c')
-rw-r--r--demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-LWIP-HTTPS-CLIENT-SNI/web/web.c190
1 files changed, 190 insertions, 0 deletions
diff --git a/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-LWIP-HTTPS-CLIENT-SNI/web/web.c b/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-LWIP-HTTPS-CLIENT-SNI/web/web.c
new file mode 100644
index 000000000..628d6e563
--- /dev/null
+++ b/demos/ATSAMA5D2/RT-SAMA5D2-XPLAINED-LWIP-HTTPS-CLIENT-SNI/web/web.c
@@ -0,0 +1,190 @@
+/*
+ ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+
+/*
+ * This file is a modified version of the lwIP web server demo. The original
+ * author is unknown because the file didn't contain any license information.
+ */
+
+/**
+ * @file web.c
+ * @brief HTTPS client code.
+ * @{
+ */
+#include <ctype.h>
+
+#include "ch.h"
+
+#include "lwip/netdb.h"
+#include "lwip/sockets.h"
+
+#include <string.h>
+
+#include "wolfssl_chibios.h"
+#include "web.h"
+#include "chprintf.h"
+
+#if defined WOLFSSL_USE_SOCKET
+#define MAX_SSL_BUF 1460
+static uint8_t ssl_recv_buffer[MAX_SSL_BUF];
+#endif /* WOLFSSL_USE_SOCKET */
+
+extern unsigned char httpbin_root[];
+extern size_t httpbin_root_length(void);
+
+/* HTTP request */
+static const char *REQUEST = "GET "CONFIG_RESOURCE" HTTP/1.0\r\n"
+ "Host: "CONFIG_WEBSITE"\r\n"
+ "User-Agent: SAMA5D2\r\n"
+ "\r\n";
+
+struct addrinfo hints = {
+ .ai_family = AF_INET,
+ .ai_socktype = SOCK_STREAM,
+ };
+
+static struct addrinfo *res;
+
+static WOLFSSL_CTX* ctx;
+static WOLFSSL* ssl;
+static WOLFSSL_METHOD* method;
+
+/*
+ * @brief HTTPS client functions.
+ */
+int https_client(void) {
+
+ /* Resolve the IP of the target website using open dns */
+ int result = getaddrinfo(CONFIG_WEBSITE, WEB_PORT, &hints, &res);
+
+ if((result != 0) || (res == NULL)) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to resolve IP for target website %s\n\r", CONFIG_WEBSITE);
+ return 0;
+ }
+
+ chprintf((BaseSequentialStream *)&SD1,"Target website's IP resolved\n\r");
+
+ /* create a new socket */
+ int s = socket(AF_INET, SOCK_STREAM, 0);
+
+ if(s < 0) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to allocate a new socket\n\r");
+ return 0;
+ }
+
+ chprintf((BaseSequentialStream *)&SD1, "Socket allocated, id=%d\n\r", s);
+
+ /* connect to the specified server */
+ result = connect(s, res->ai_addr, res->ai_addrlen);
+ if(result != 0) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to connect to the target website\n\r");
+ close(s);
+ return 0;
+ }
+
+ chprintf((BaseSequentialStream *)&SD1, "Connected to the target website\n\r");
+
+ /* initialize wolfssl library */
+ wolfSSL_Init();
+ method = wolfTLSv1_2_client_method(); /* use TLS v1.2 */
+
+ /* make new ssl context */
+ if ((ctx = wolfSSL_CTX_new(method)) == NULL) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_CTX_new error\n\r");
+ close(s);
+ return 0;
+ }
+
+ wolfSSL_SetIORecv(ctx, wolfssl_recv_cb) ;
+ wolfSSL_SetIOSend(ctx, wolfssl_send_cb) ;
+
+#ifdef HAVE_SNI
+ char* sniHostName = CONFIG_WEBSITE;
+
+ if (wolfSSL_CTX_UseSNI(ctx, 0, sniHostName,
+ (word16) XSTRLEN(sniHostName)) != WOLFSSL_SUCCESS) {
+ wolfSSL_CTX_free(ctx);
+ chprintf((BaseSequentialStream *)&SD1, "SNI failed\n\r");
+ close(s);
+ return 0;
+ }
+#endif /* HAVE_SNI */
+
+ /* Add cert to ctx */
+ int e = 0;
+
+ e = wolfSSL_CTX_load_verify_buffer(ctx, httpbin_root, httpbin_root_length(), SSL_FILETYPE_PEM);
+ if (e != SSL_SUCCESS) {
+ chprintf((BaseSequentialStream *)&SD1, "Error loading client certs\n\r");
+ close(s);
+ return 0;
+ }
+
+ /* make new wolfSSL struct */
+ if ((ssl = wolfSSL_new(ctx)) == NULL) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_new error\n\r");
+ close(s);
+ return 0;
+ }
+
+ /* Connect wolfssl to the socket, server, then send message */
+ e = wolfSSL_set_fd(ssl, s);
+ if (e != SSL_SUCCESS) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_set_fd error\n\r");
+ close(s);
+ return 0;
+ }
+
+ e = wolfSSL_connect(ssl);
+ if (e != SSL_SUCCESS) {
+ chprintf((BaseSequentialStream *)&SD1, "wolfSSL_connect error\n\r");
+ close(s);
+ return 0;
+ }
+
+ /* send the request */
+ result = wolfSSL_write(ssl, REQUEST, strlen(REQUEST));
+ if(result < 0) {
+ chprintf((BaseSequentialStream *)&SD1, "Unable to send the HTTP request\r\n");
+ close(s);
+ return 0;
+ }
+ chprintf((BaseSequentialStream *)&SD1, "HTTP request sent\n\r");
+
+ /* print the response */
+ chprintf((BaseSequentialStream *)&SD1, "HTTP response:\n\r");
+ chprintf((BaseSequentialStream *)&SD1,"--------------------------------------------------------------------------------\n\r");
+ int r;
+ do {
+ memset(ssl_recv_buffer, 0, MAX_SSL_BUF);
+ r = wolfSSL_read(ssl, ssl_recv_buffer, MAX_SSL_BUF - 1);
+ chprintf((BaseSequentialStream *)&SD1,"%s\n\r",ssl_recv_buffer);
+ } while(r > 0);
+ chprintf((BaseSequentialStream *)&SD1, "--------------------------------------------------------------------------------\n\r");
+
+ /* frees all data before client termination */
+ wolfSSL_free(ssl);
+ wolfSSL_CTX_free(ctx);
+ wolfSSL_Cleanup();
+
+ lwip_freeaddrinfo(res);
+ close(s);
+ chprintf((BaseSequentialStream *)&SD1, "Socket closed\n\r");
+
+ return 1;
+}
+
+/** @} */