1027 lines
32 KiB
C
1027 lines
32 KiB
C
|
/*================================================================
|
||
|
Copyright (c) 2020 Quectel Wireless Solution, Co., Ltd. All Rights Reserved.
|
||
|
Quectel Wireless Solution Proprietary and Confidential.
|
||
|
=================================================================*/
|
||
|
/*=================================================================
|
||
|
|
||
|
EDIT HISTORY FOR MODULE
|
||
|
|
||
|
This section contains comments describing changes made to the module.
|
||
|
Notice that changes are listed in reverse chronological order.
|
||
|
|
||
|
WHEN WHO WHAT, WHERE, WHY
|
||
|
------------ ------- -------------------------------------------------------------------------------
|
||
|
|
||
|
=================================================================*/
|
||
|
|
||
|
|
||
|
|
||
|
#include <stdio.h>
|
||
|
#include <string.h>
|
||
|
#include <stdlib.h>
|
||
|
|
||
|
#include "ql_api_osi.h"
|
||
|
#include "ql_api_nw.h"
|
||
|
|
||
|
#include "ql_log.h"
|
||
|
#include "ql_api_datacall.h"
|
||
|
#include "sockets.h"
|
||
|
#include "lwip/ip_addr.h"
|
||
|
#include "lwip/ip6_addr.h"
|
||
|
|
||
|
#include "lwip/netdb.h"
|
||
|
#include "lwip/netif.h"
|
||
|
#include "lwip/inet.h"
|
||
|
#include "lwip/tcp.h"
|
||
|
|
||
|
#include "ql_ssl.h"
|
||
|
|
||
|
#define QL_SSL_LOG_LEVEL QL_LOG_LEVEL_INFO
|
||
|
#define QL_SSL_LOG(msg, ...) QL_LOG(QL_SSL_LOG_LEVEL, "ssl_demo", msg, ##__VA_ARGS__)
|
||
|
#define QL_SSL_LOG_PUSH(msg, ...) QL_LOG_PUSH("ssl_demo", msg, ##__VA_ARGS__)
|
||
|
|
||
|
|
||
|
static ql_task_t ssl_task = NULL;
|
||
|
|
||
|
#define TEST_HOST_ADDR "www.baidu.com"
|
||
|
#define TEST_HOST_PORT 443
|
||
|
|
||
|
#define TEST_SEND_DATA "GET /index.html HTTP/1.1\r\n\
|
||
|
HOST: www.baidu.com\r\n\
|
||
|
User-Agent: QuecOpen\r\n\
|
||
|
Connection: Keep-Alive\r\n\r\n\0"
|
||
|
|
||
|
#define DTLS_TEST_HOST_ADDR "220.180.239.212"
|
||
|
#define DTLS_TEST_HOST_PORT 8252
|
||
|
|
||
|
char *chain_path="UFS:cacert.pem";
|
||
|
|
||
|
static void ssl_test_tls_with_noblocking(int profile_idx)
|
||
|
{
|
||
|
ql_data_call_info_s info;
|
||
|
struct sockaddr_in local4, server_ipv4;
|
||
|
struct sockaddr_in6 local6, server_ipv6;
|
||
|
struct addrinfo *pres = NULL;
|
||
|
char ip_addr_str[64] = {0};
|
||
|
int socket_fd = -1;
|
||
|
int flags = 0;
|
||
|
int ret = 0;
|
||
|
fd_set read_fds;
|
||
|
fd_set write_fds;
|
||
|
fd_set exp_fds;
|
||
|
int fd_changed;
|
||
|
int connected = 0;
|
||
|
int ssl_hs_completed = 0;
|
||
|
ql_ssl_config ssl_cfg;
|
||
|
ql_ssl_context ssl_ctx;
|
||
|
|
||
|
ql_get_data_call_info(0, profile_idx, &info);
|
||
|
|
||
|
ret = getaddrinfo_with_pcid(TEST_HOST_ADDR, NULL, NULL, &pres, (uint32)profile_idx);
|
||
|
if (ret < 0 || pres == NULL)
|
||
|
{
|
||
|
QL_SSL_LOG("DNS getaddrinfo failed! ret=%d; pres=%p!",ret,pres);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
QL_SSL_LOG("local ip ver:%d", info.ip_version);
|
||
|
|
||
|
if(info.ip_version == QL_PDP_TYPE_IPV6){
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
if(temp->ai_family == AF_INET6){
|
||
|
socket_fd = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
|
||
|
if(socket_fd < 0){
|
||
|
break;
|
||
|
}
|
||
|
flags |= O_NONBLOCK;
|
||
|
fcntl(socket_fd, F_SETFL,flags);
|
||
|
local6.sin6_family = AF_INET6;
|
||
|
local6.sin6_port = 0;
|
||
|
local6.sin6_len = sizeof(struct sockaddr_in6);
|
||
|
inet6_aton(ip6addr_ntoa(&info.v6.addr.ip), &local6.sin6_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local6,sizeof(struct sockaddr));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
memcpy(&server_ipv6, (struct sockaddr_in6 *)temp->ai_addr, sizeof(struct sockaddr_in6));
|
||
|
server_ipv6.sin6_family = AF_INET6;
|
||
|
server_ipv6.sin6_port = htons(TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET6, &server_ipv6.sin6_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv6.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv6, sizeof(server_ipv6));
|
||
|
if((ret < 0 && lwip_get_error(socket_fd) == EINPROGRESS) || ret ==0){
|
||
|
if(ret == 0)
|
||
|
connected = 1;
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}else{
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
QL_SSL_LOG("temp->ai_family:%d", temp->ai_family);
|
||
|
if(temp->ai_family == AF_INET){
|
||
|
struct sockaddr_in * sin_res = (struct sockaddr_in *)temp->ai_addr;
|
||
|
socket_fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
if(socket_fd < 0){
|
||
|
break;
|
||
|
}
|
||
|
flags |= O_NONBLOCK;
|
||
|
fcntl(socket_fd, F_SETFL,flags);
|
||
|
local4.sin_family = AF_INET;
|
||
|
local4.sin_port = 0;
|
||
|
inet_aton(ip4addr_ntoa(&info.v4.addr.ip), &local4.sin_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local4,sizeof(struct sockaddr));
|
||
|
QL_SSL_LOG("bind ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
memset(&server_ipv4, 0x00, sizeof(struct sockaddr_in));
|
||
|
server_ipv4.sin_addr = sin_res->sin_addr;
|
||
|
server_ipv4.sin_family = AF_INET;
|
||
|
server_ipv4.sin_port = htons(TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET, &server_ipv4.sin_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv4.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv4, sizeof(server_ipv4));
|
||
|
QL_SSL_LOG("connect ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if((ret < 0 && lwip_get_error(socket_fd) == EINPROGRESS) || ret ==0){
|
||
|
if(ret == 0)
|
||
|
connected = 1;
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
freeaddrinfo(pres);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
if(socket_fd < 0)
|
||
|
return;
|
||
|
|
||
|
FD_ZERO(&read_fds);
|
||
|
FD_ZERO(&write_fds);
|
||
|
FD_ZERO(&exp_fds);
|
||
|
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
FD_SET(socket_fd, &exp_fds);
|
||
|
|
||
|
while(1){
|
||
|
fd_changed = select(socket_fd+1, &read_fds, &write_fds, &exp_fds, NULL);
|
||
|
if(fd_changed > 0){
|
||
|
if(FD_ISSET(socket_fd, &write_fds)){
|
||
|
FD_CLR(socket_fd, &write_fds);
|
||
|
if(connected== 0){
|
||
|
int value = 0;
|
||
|
int len = 0;
|
||
|
|
||
|
len = sizeof(value);
|
||
|
getsockopt(socket_fd, SOL_SOCKET, SO_ERROR, &value, &len);
|
||
|
|
||
|
QL_SSL_LOG("errno: %d", value);
|
||
|
if(value == 0 || value == EISCONN ){
|
||
|
int *ciphersuit = NULL;
|
||
|
|
||
|
connected = 1;
|
||
|
QL_SSL_LOG("tcp socket connected and ready to write!!!!");
|
||
|
do{
|
||
|
ret = ql_ssl_conf_init(&ssl_cfg);
|
||
|
ciphersuit = malloc(sizeof(int)*3);
|
||
|
if(ciphersuit == NULL){
|
||
|
ret = QL_SSL_ERROR_OUT_OF_MEM;
|
||
|
break;
|
||
|
}
|
||
|
memset(ciphersuit, 0x00, sizeof(int)*3);
|
||
|
|
||
|
ciphersuit[0] = QL_SSL_TLS_RSA_WITH_RC4_128_MD5;
|
||
|
ciphersuit[1] = QL_SSL_TLS_RSA_WITH_RC4_128_SHA;
|
||
|
//Sets the array of cipher groups for the mbedTLS_SSL_CONF_cipherSuites function
|
||
|
//The entire array ends with the number 0
|
||
|
ciphersuit[2] = 0;
|
||
|
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_VERSION, QL_SSL_VERSION_ALL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_TRANSPORT, QL_SSL_TLS_PROTOCOL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_AUTHMODE, QL_SSL_VERIFY_NULL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_HS_TIMEOUT, 60);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CIPHERSUITE, ciphersuit);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CACERT, &chain_path,1);
|
||
|
//ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_IGNORE_CERT_ITEM, MBEDTLS_X509_BADCERT_KEY_USAGE|MBEDTLS_X509_BADCERT_CN_MISMATCH);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_SNI, 1);
|
||
|
if((ret =ql_ssl_new(&ssl_ctx)) != QL_SSL_SUCCESS){
|
||
|
break;
|
||
|
}
|
||
|
ql_ssl_set_socket_fd(&ssl_ctx, socket_fd);
|
||
|
if((ret= ql_ssl_setup(&ssl_ctx, &ssl_cfg)) != QL_SSL_SUCCESS){
|
||
|
break;
|
||
|
}
|
||
|
ret = ql_ssl_set_hostname(&ssl_ctx, TEST_HOST_ADDR);
|
||
|
QL_SSL_LOG("set_hostname:%08x", ret);
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
|
||
|
}while(0);
|
||
|
if(!(ret == QL_SSL_SUCCESS || ret == QL_SSL_ERROR_WANT_READ||ret == QL_SSL_ERROR_WANT_WRITE)){
|
||
|
QL_SSL_LOG("ssl handshake failed!!!!");
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_READ){
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_WRITE){
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
}else if(ret == QL_SSL_SUCCESS){
|
||
|
ssl_hs_completed = 1;
|
||
|
QL_SSL_LOG("SSL HandShake completed!!!!");
|
||
|
|
||
|
ql_ssl_write(&ssl_ctx, (const unsigned char *)TEST_SEND_DATA, strlen(TEST_SEND_DATA));
|
||
|
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}
|
||
|
}else{
|
||
|
QL_SSL_LOG("tcp socket connected failure!!!!");
|
||
|
break;
|
||
|
}
|
||
|
}else{
|
||
|
QL_SSL_LOG("tcp socket ready to write!!!!");
|
||
|
if(ssl_hs_completed == 0){
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
if(!(ret == QL_SSL_SUCCESS || ret == QL_SSL_ERROR_WANT_READ||ret == QL_SSL_ERROR_WANT_WRITE)){
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_READ){
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_WRITE){
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
}else if(ret == QL_SSL_SUCCESS){
|
||
|
ssl_hs_completed = 1;
|
||
|
QL_SSL_LOG("SSL HandShake completed!!!!");
|
||
|
|
||
|
ql_ssl_write(&ssl_ctx, (const unsigned char *)TEST_SEND_DATA, strlen(TEST_SEND_DATA));
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
if(FD_ISSET(socket_fd, &read_fds)){
|
||
|
FD_CLR(socket_fd, &read_fds);
|
||
|
QL_SSL_LOG("tcp socket ready to read!!!!");
|
||
|
if(ssl_hs_completed == 0){
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
if(!(ret == QL_SSL_SUCCESS || ret == QL_SSL_ERROR_WANT_READ||ret == QL_SSL_ERROR_WANT_WRITE)){
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_READ){
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_WRITE){
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
}else if(ret == QL_SSL_SUCCESS){
|
||
|
ssl_hs_completed = 1;
|
||
|
QL_SSL_LOG("SSL HandShake completed!!!!");
|
||
|
|
||
|
ql_ssl_write(&ssl_ctx, (const unsigned char *)TEST_SEND_DATA, strlen(TEST_SEND_DATA));
|
||
|
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}
|
||
|
}else{
|
||
|
unsigned char test_recv_buf[513] = {0};
|
||
|
int end = 0;
|
||
|
do{
|
||
|
ret =ql_ssl_read(&ssl_ctx, test_recv_buf, 512);
|
||
|
QL_SSL_LOG("ret:%d", ret);
|
||
|
if(ret > 0){
|
||
|
QL_SSL_LOG("recv: %s", test_recv_buf);
|
||
|
if(ret < 512)
|
||
|
{
|
||
|
end = 1;
|
||
|
break;
|
||
|
}
|
||
|
}else{
|
||
|
if(ret == QL_SSL_ERROR_WANT_READ){
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}else{
|
||
|
end = 1;
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
}while(1);
|
||
|
if(end == 1)
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
if(FD_ISSET(socket_fd, &exp_fds)){
|
||
|
FD_CLR(socket_fd, &exp_fds);
|
||
|
QL_SSL_LOG("tcp socket occur exception!!!!");
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
if(ssl_hs_completed == 1){
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
}
|
||
|
close(socket_fd);
|
||
|
}
|
||
|
|
||
|
static void ssl_test_tls_with_blocking(int profile_idx)
|
||
|
{
|
||
|
ql_data_call_info_s info;
|
||
|
struct sockaddr_in local4, server_ipv4;
|
||
|
struct sockaddr_in6 local6, server_ipv6;
|
||
|
struct addrinfo *pres = NULL;
|
||
|
char ip_addr_str[64] = {0};
|
||
|
int socket_fd = -1;
|
||
|
int socket_fd2 = -1;
|
||
|
int ret = 0,ret2 = 0;
|
||
|
ql_ssl_config ssl_cfg;
|
||
|
ql_ssl_context ssl_ctx,ssl_ctx2;
|
||
|
|
||
|
ql_get_data_call_info(0, profile_idx, &info);
|
||
|
|
||
|
ret = getaddrinfo_with_pcid(TEST_HOST_ADDR, NULL, NULL, &pres, (uint32)profile_idx);
|
||
|
if (ret < 0 || pres == NULL)
|
||
|
{
|
||
|
QL_SSL_LOG("DNS getaddrinfo failed! ret=%d; pres=%p!",ret,pres);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
QL_SSL_LOG("local ip ver:%d", info.ip_version);
|
||
|
|
||
|
if(info.ip_version == QL_PDP_TYPE_IPV6){
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
if(temp->ai_family == AF_INET6){
|
||
|
socket_fd = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
|
||
|
if(socket_fd < 0){
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
local6.sin6_family = AF_INET6;
|
||
|
local6.sin6_port = 0;
|
||
|
local6.sin6_len = sizeof(struct sockaddr_in6);
|
||
|
inet6_aton(ip6addr_ntoa(&info.v6.addr.ip), &local6.sin6_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local6,sizeof(struct sockaddr));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
memcpy(&server_ipv6, (struct sockaddr_in6 *)temp->ai_addr, sizeof(struct sockaddr_in6));
|
||
|
server_ipv6.sin6_family = AF_INET6;
|
||
|
server_ipv6.sin6_port = htons(TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET6, &server_ipv6.sin6_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv6.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv6, sizeof(server_ipv6));
|
||
|
if(ret ==0){
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}else{
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
QL_SSL_LOG("temp->ai_family:%d", temp->ai_family);
|
||
|
if(temp->ai_family == AF_INET){
|
||
|
struct sockaddr_in * sin_res = (struct sockaddr_in *)temp->ai_addr;
|
||
|
socket_fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
||
|
socket_fd2 = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
QL_SSL_LOG("socket fd2:%d",socket_fd2);
|
||
|
if((socket_fd < 0)||(socket_fd2 < 0)){
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
local4.sin_family = AF_INET;
|
||
|
local4.sin_port = 0;
|
||
|
inet_aton(ip4addr_ntoa(&info.v4.addr.ip), &local4.sin_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local4,sizeof(struct sockaddr));
|
||
|
QL_SSL_LOG("bind socket_fd ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
ret = bind(socket_fd2,(struct sockaddr *)&local4,sizeof(struct sockaddr));
|
||
|
QL_SSL_LOG("bind socket_fd2 ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd2);
|
||
|
socket_fd2 = -1;
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
memset(&server_ipv4, 0x00, sizeof(struct sockaddr_in));
|
||
|
server_ipv4.sin_addr = sin_res->sin_addr;
|
||
|
server_ipv4.sin_family = AF_INET;
|
||
|
server_ipv4.sin_port = htons(TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET, &server_ipv4.sin_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv4.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv4, sizeof(server_ipv4));
|
||
|
QL_SSL_LOG("socket_fd connect ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
ret2 = connect(socket_fd2, (struct sockaddr *)&server_ipv4, sizeof(server_ipv4));
|
||
|
QL_SSL_LOG("socket_fd2 connect ret:%d, errno:%d",ret2, lwip_get_error(socket_fd));
|
||
|
if((ret ==0)&&(ret2 ==0)){
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
close(socket_fd2);
|
||
|
socket_fd2 = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
freeaddrinfo(pres);
|
||
|
QL_SSL_LOG("socket fd:%d,socket fd2:%d",socket_fd,socket_fd2);
|
||
|
if((socket_fd < 0)||(socket_fd2 < 0))
|
||
|
return;
|
||
|
//ssl handshake
|
||
|
do{
|
||
|
int *ciphersuit = NULL;
|
||
|
ret = ql_ssl_conf_init(&ssl_cfg);
|
||
|
ciphersuit = malloc(sizeof(int)*3);
|
||
|
if(ciphersuit == NULL){
|
||
|
ret = QL_SSL_ERROR_OUT_OF_MEM;
|
||
|
break;
|
||
|
}
|
||
|
memset(ciphersuit, 0x00, sizeof(int)*3);
|
||
|
|
||
|
ciphersuit[0] = QL_SSL_TLS_RSA_WITH_RC4_128_MD5;
|
||
|
ciphersuit[1] = QL_SSL_TLS_RSA_WITH_RC4_128_SHA;
|
||
|
//Sets the array of cipher groups for the mbedTLS_SSL_CONF_cipherSuites function
|
||
|
//The entire array ends with the number 0
|
||
|
ciphersuit[2] = 0;
|
||
|
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_VERSION, QL_SSL_VERSION_ALL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_TRANSPORT, QL_SSL_TLS_PROTOCOL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_AUTHMODE, QL_SSL_VERIFY_NULL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_HS_TIMEOUT, 60);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CIPHERSUITE, ciphersuit);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CACERT, &chain_path,1);
|
||
|
//ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_IGNORE_CERT_ITEM, MBEDTLS_X509_BADCERT_KEY_USAGE|MBEDTLS_X509_BADCERT_CN_MISMATCH);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_SNI, 1);
|
||
|
if(((ret =ql_ssl_new(&ssl_ctx)) != QL_SSL_SUCCESS)||((ret =ql_ssl_new(&ssl_ctx2)) != QL_SSL_SUCCESS)){
|
||
|
break;
|
||
|
}
|
||
|
ql_ssl_set_socket_fd(&ssl_ctx, socket_fd);
|
||
|
ql_ssl_set_socket_fd(&ssl_ctx2, socket_fd2);
|
||
|
if(((ret= ql_ssl_setup(&ssl_ctx, &ssl_cfg)) != QL_SSL_SUCCESS)||((ret2= ql_ssl_setup(&ssl_ctx2, &ssl_cfg)) != QL_SSL_SUCCESS)){
|
||
|
break;
|
||
|
}
|
||
|
ql_ssl_set_hostname(&ssl_ctx, TEST_HOST_ADDR);
|
||
|
QL_SSL_LOG("set_hostname:%08x", ret);
|
||
|
ql_ssl_set_hostname(&ssl_ctx2, TEST_HOST_ADDR);
|
||
|
QL_SSL_LOG("set_hostname:%08x", ret);
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
ret2 = ql_ssl_handshake(&ssl_ctx2);
|
||
|
}while(0);
|
||
|
if((ret != QL_SSL_SUCCESS)||(ret2 != QL_SSL_SUCCESS)){
|
||
|
QL_SSL_LOG("ssl handshake failed!!!!");
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
ql_ssl_free(&ssl_ctx2);
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
shutdown(socket_fd2, SHUT_WR);
|
||
|
close(socket_fd);
|
||
|
close(socket_fd2);
|
||
|
return ;
|
||
|
}else{
|
||
|
unsigned char test_recv_buf[120] = {0};
|
||
|
QL_SSL_LOG("SSL HandShake completed!!!!");
|
||
|
|
||
|
if(ql_ssl_write(&ssl_ctx, (const unsigned char *)TEST_SEND_DATA, strlen(TEST_SEND_DATA)) >0){
|
||
|
while((ret = ql_ssl_read(&ssl_ctx, test_recv_buf,120)) > 0){
|
||
|
|
||
|
QL_SSL_LOG("recv: %s", test_recv_buf);
|
||
|
if(ret < 120)
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
if(ql_ssl_write(&ssl_ctx2, (const unsigned char *)TEST_SEND_DATA, strlen(TEST_SEND_DATA)) >0){
|
||
|
while((ret = ql_ssl_read(&ssl_ctx2, test_recv_buf,120)) > 0){
|
||
|
|
||
|
QL_SSL_LOG("recv2: %s", test_recv_buf);
|
||
|
if(ret < 120)
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
ql_ssl_close_notify(&ssl_ctx);
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_RDWR);
|
||
|
close(socket_fd);
|
||
|
ql_ssl_close_notify(&ssl_ctx2);
|
||
|
ql_ssl_free(&ssl_ctx2);
|
||
|
shutdown(socket_fd2, SHUT_RDWR);
|
||
|
close(socket_fd2);
|
||
|
return ;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
#ifdef QL_SSL_TLS_SESSION_CACHE_FEATURE
|
||
|
static void ssl_test_tls_with_session_cache(int profile_idx)
|
||
|
{
|
||
|
int loop_cnt = 5;
|
||
|
ql_ssl_config ssl_cfg;
|
||
|
|
||
|
ql_ssl_conf_init(&ssl_cfg);
|
||
|
|
||
|
loop_cnt = 5;
|
||
|
while(loop_cnt)
|
||
|
{
|
||
|
ql_data_call_info_s info;
|
||
|
struct sockaddr_in local4, server_ipv4;
|
||
|
struct sockaddr_in6 local6, server_ipv6;
|
||
|
struct addrinfo *pres = NULL;
|
||
|
char ip_addr_str[64] = {0};
|
||
|
int socket_fd = -1;
|
||
|
int ret = 0;
|
||
|
ql_ssl_context ssl_ctx;
|
||
|
|
||
|
QL_SSL_LOG("loop_cnt:%d", loop_cnt);
|
||
|
|
||
|
loop_cnt --;
|
||
|
|
||
|
ql_get_data_call_info(0, profile_idx, &info);
|
||
|
|
||
|
ret = getaddrinfo_with_pcid(TEST_HOST_ADDR, NULL, NULL, &pres, (uint32)profile_idx);
|
||
|
if (ret < 0 || pres == NULL)
|
||
|
{
|
||
|
QL_SSL_LOG("DNS getaddrinfo failed! ret=%d; pres=%p!",ret,pres);
|
||
|
continue;
|
||
|
}
|
||
|
|
||
|
QL_SSL_LOG("local ip ver:%d", info.ip_version);
|
||
|
|
||
|
if(info.ip_version == QL_PDP_TYPE_IPV6){
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
if(temp->ai_family == AF_INET6){
|
||
|
socket_fd = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
|
||
|
if(socket_fd < 0){
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
local6.sin6_family = AF_INET6;
|
||
|
local6.sin6_port = 0;
|
||
|
local6.sin6_len = sizeof(struct sockaddr_in6);
|
||
|
inet6_aton(ip6addr_ntoa(&info.v6.addr.ip), &local6.sin6_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local6,sizeof(struct sockaddr));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
memcpy(&server_ipv6, (struct sockaddr_in6 *)temp->ai_addr, sizeof(struct sockaddr_in6));
|
||
|
server_ipv6.sin6_family = AF_INET6;
|
||
|
server_ipv6.sin6_port = htons(TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET6, &server_ipv6.sin6_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv6.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv6, sizeof(server_ipv6));
|
||
|
if(ret ==0){
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}else{
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
QL_SSL_LOG("temp->ai_family:%d", temp->ai_family);
|
||
|
if(temp->ai_family == AF_INET){
|
||
|
struct sockaddr_in * sin_res = (struct sockaddr_in *)temp->ai_addr;
|
||
|
socket_fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
if((socket_fd < 0)){
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
local4.sin_family = AF_INET;
|
||
|
local4.sin_port = 0;
|
||
|
inet_aton(ip4addr_ntoa(&info.v4.addr.ip), &local4.sin_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local4,sizeof(struct sockaddr));
|
||
|
QL_SSL_LOG("bind socket_fd ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
memset(&server_ipv4, 0x00, sizeof(struct sockaddr_in));
|
||
|
server_ipv4.sin_addr = sin_res->sin_addr;
|
||
|
server_ipv4.sin_family = AF_INET;
|
||
|
server_ipv4.sin_port = htons(TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET, &server_ipv4.sin_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv4.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv4, sizeof(server_ipv4));
|
||
|
QL_SSL_LOG("socket_fd connect ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if((ret ==0)){
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
freeaddrinfo(pres);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
if((socket_fd < 0))
|
||
|
continue;
|
||
|
//ssl handshake
|
||
|
do{
|
||
|
int *ciphersuit = NULL;
|
||
|
ciphersuit = malloc(sizeof(int)*3);
|
||
|
if(ciphersuit == NULL){
|
||
|
ret = QL_SSL_ERROR_OUT_OF_MEM;
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
ciphersuit[0] = QL_SSL_TLS_RSA_WITH_RC4_128_MD5;
|
||
|
ciphersuit[1] = QL_SSL_TLS_RSA_WITH_RC4_128_SHA;
|
||
|
ciphersuit[2] = 0;
|
||
|
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_VERSION, QL_SSL_VERSION_ALL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_TRANSPORT, QL_SSL_TLS_PROTOCOL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_AUTHMODE, QL_SSL_VERIFY_NULL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_HS_TIMEOUT, 60);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CIPHERSUITE, ciphersuit);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CACERT, &chain_path,1);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_SESSION_CACHE, 1);
|
||
|
if(((ret =ql_ssl_new(&ssl_ctx)) != QL_SSL_SUCCESS)){
|
||
|
break;
|
||
|
}
|
||
|
if((ret= ql_ssl_setup(&ssl_ctx, &ssl_cfg)) != QL_SSL_SUCCESS){
|
||
|
break;
|
||
|
}
|
||
|
ql_ssl_set_hostname(&ssl_ctx, TEST_HOST_ADDR);
|
||
|
ql_ssl_set_socket_fd(&ssl_ctx, socket_fd);
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
}while(0);
|
||
|
if((ret != QL_SSL_SUCCESS)){
|
||
|
QL_SSL_LOG("ssl handshake failed!!!!");
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_WR);
|
||
|
close(socket_fd);
|
||
|
continue ;
|
||
|
}else{
|
||
|
unsigned char test_recv_buf[120] = {0};
|
||
|
QL_SSL_LOG("SSL HandShake completed!!!!");
|
||
|
|
||
|
if(ql_ssl_write(&ssl_ctx, (const unsigned char *)TEST_SEND_DATA, strlen(TEST_SEND_DATA)) >0){
|
||
|
while((ret = ql_ssl_read(&ssl_ctx, test_recv_buf,120)) > 0){
|
||
|
|
||
|
QL_SSL_LOG("recv: %s", test_recv_buf);
|
||
|
if(ret < 120)
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
ql_ssl_close_notify(&ssl_ctx);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
shutdown(socket_fd, SHUT_RDWR);
|
||
|
close(socket_fd);
|
||
|
continue ;
|
||
|
}
|
||
|
}
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
static void ssl_test_dtls(int profile_idx)
|
||
|
{
|
||
|
ql_data_call_info_s info;
|
||
|
struct sockaddr_in local4, server_ipv4;
|
||
|
struct sockaddr_in6 local6, server_ipv6;
|
||
|
struct addrinfo *pres = NULL;
|
||
|
char ip_addr_str[64] = {0};
|
||
|
int socket_fd = -1;
|
||
|
int ret = 0;
|
||
|
int flags = 0;
|
||
|
fd_set read_fds;
|
||
|
fd_set write_fds;
|
||
|
fd_set exp_fds;
|
||
|
int fd_changed;
|
||
|
ql_ssl_config ssl_cfg;
|
||
|
ql_ssl_context ssl_ctx;
|
||
|
int *ciphersuit = NULL;
|
||
|
int ssl_hs_completed = 0;
|
||
|
|
||
|
FD_ZERO(&read_fds);
|
||
|
FD_ZERO(&write_fds);
|
||
|
FD_ZERO(&exp_fds);
|
||
|
|
||
|
ql_get_data_call_info(0, profile_idx, &info);
|
||
|
|
||
|
ret = getaddrinfo_with_pcid(DTLS_TEST_HOST_ADDR, NULL, NULL, &pres, (uint32)profile_idx);
|
||
|
if (ret < 0 || pres == NULL)
|
||
|
{
|
||
|
QL_SSL_LOG("DNS getaddrinfo failed! ret=%d; pres=%p!",ret,pres);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
QL_SSL_LOG("local ip ver:%d", info.ip_version);
|
||
|
|
||
|
if(info.ip_version == QL_PDP_TYPE_IPV6){
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
if(temp->ai_family == AF_INET6){
|
||
|
socket_fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);
|
||
|
if(socket_fd < 0){
|
||
|
break;
|
||
|
}
|
||
|
flags |= O_NONBLOCK;
|
||
|
fcntl(socket_fd, F_SETFL,flags);
|
||
|
local6.sin6_family = AF_INET6;
|
||
|
local6.sin6_port = 0;
|
||
|
local6.sin6_len = sizeof(struct sockaddr_in6);
|
||
|
inet6_aton(ip6addr_ntoa(&info.v6.addr.ip), &local6.sin6_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local6,sizeof(struct sockaddr));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
memcpy(&server_ipv6, (struct sockaddr_in6 *)temp->ai_addr, sizeof(struct sockaddr_in6));
|
||
|
server_ipv6.sin6_family = AF_INET6;
|
||
|
server_ipv6.sin6_port = htons(DTLS_TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET6, &server_ipv6.sin6_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv6.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv6, sizeof(server_ipv6));
|
||
|
if(ret ==0){
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}else{
|
||
|
struct addrinfo *temp = NULL;
|
||
|
for(temp = pres; temp != NULL; temp = temp->ai_next){
|
||
|
QL_SSL_LOG("temp->ai_family:%d", temp->ai_family);
|
||
|
if(temp->ai_family == AF_INET){
|
||
|
struct sockaddr_in * sin_res = (struct sockaddr_in *)temp->ai_addr;
|
||
|
socket_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
if(socket_fd < 0){
|
||
|
break;
|
||
|
}
|
||
|
flags |= O_NONBLOCK;
|
||
|
fcntl(socket_fd, F_SETFL,flags);
|
||
|
local4.sin_family = AF_INET;
|
||
|
local4.sin_port = 0;
|
||
|
inet_aton(ip4addr_ntoa(&info.v4.addr.ip), &local4.sin_addr);
|
||
|
ret = bind(socket_fd,(struct sockaddr *)&local4,sizeof(struct sockaddr));
|
||
|
QL_SSL_LOG("bind ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if(ret != 0){
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
break;
|
||
|
}
|
||
|
memset(&server_ipv4, 0x00, sizeof(struct sockaddr_in));
|
||
|
server_ipv4.sin_addr = sin_res->sin_addr;
|
||
|
server_ipv4.sin_family = AF_INET;
|
||
|
server_ipv4.sin_port = htons(DTLS_TEST_HOST_PORT);
|
||
|
inet_ntop(AF_INET, &server_ipv4.sin_addr, ip_addr_str, sizeof(ip_addr_str));
|
||
|
QL_SSL_LOG("By DNS,server_ipv4.sin_addr: %s", ip_addr_str);
|
||
|
ret = connect(socket_fd, (struct sockaddr *)&server_ipv4, sizeof(server_ipv4));
|
||
|
QL_SSL_LOG("connect ret:%d, errno:%d",ret, lwip_get_error(socket_fd));
|
||
|
if(ret ==0){
|
||
|
break;
|
||
|
}else{
|
||
|
close(socket_fd);
|
||
|
socket_fd = -1;
|
||
|
continue;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
freeaddrinfo(pres);
|
||
|
QL_SSL_LOG("socket fd:%d",socket_fd);
|
||
|
if(socket_fd < 0)
|
||
|
return;
|
||
|
//ssl handshake
|
||
|
|
||
|
ret = ql_ssl_conf_init(&ssl_cfg);
|
||
|
ciphersuit = malloc(sizeof(int)*3);
|
||
|
if(ciphersuit == NULL){
|
||
|
close(socket_fd);
|
||
|
return;
|
||
|
}
|
||
|
memset(ciphersuit, 0x00, sizeof(int)*3);
|
||
|
|
||
|
ciphersuit[0] = QL_SSL_TLS_PSK_WITH_RC4_128_SHA;
|
||
|
ciphersuit[1] = QL_SSL_TLS_PSK_WITH_AES_128_CBC_SHA;
|
||
|
//Sets the array of cipher groups for the mbedTLS_SSL_CONF_cipherSuites function
|
||
|
//The entire array ends with the number 0
|
||
|
ciphersuit[2] = 0;
|
||
|
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_VERSION, QL_SSL_VERSION_3);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_TRANSPORT, QL_SSL_DTLS_PROTOCOL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_AUTHMODE, QL_SSL_VERIFY_NULL);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_HS_TIMEOUT, 5000);
|
||
|
ql_ssl_conf_set(&ssl_cfg, QL_SSL_CONF_CIPHERSUITE, ciphersuit);
|
||
|
if((ret =ql_ssl_new(&ssl_ctx)) != QL_SSL_SUCCESS){
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
close(socket_fd);
|
||
|
return;
|
||
|
}
|
||
|
if((ret= ql_ssl_setup(&ssl_ctx, &ssl_cfg)) != QL_SSL_SUCCESS){
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
close(socket_fd);
|
||
|
return;
|
||
|
}
|
||
|
ql_ssl_set_hostname(&ssl_ctx, DTLS_TEST_HOST_ADDR);
|
||
|
ql_ssl_set_socket_fd(&ssl_ctx, socket_fd);
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
if(!(ret == QL_SSL_SUCCESS || ret == QL_SSL_ERROR_WANT_READ||ret == QL_SSL_ERROR_WANT_WRITE)){
|
||
|
QL_SSL_LOG("ssl handshake failed!!!!");
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
close(socket_fd);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
if(ret != QL_SSL_SUCCESS){
|
||
|
if(ret == QL_SSL_ERROR_WANT_READ)
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
else
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
|
||
|
FD_SET(socket_fd, &exp_fds);
|
||
|
|
||
|
while(1){
|
||
|
fd_changed = select(socket_fd+1, &read_fds, &write_fds, &exp_fds, NULL);
|
||
|
if(fd_changed > 0){
|
||
|
if(FD_ISSET(socket_fd, &write_fds)){
|
||
|
FD_CLR(socket_fd, &write_fds);
|
||
|
if(ssl_hs_completed == 0){
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
if(!(ret == QL_SSL_SUCCESS || ret == QL_SSL_ERROR_WANT_READ||ret == QL_SSL_ERROR_WANT_WRITE)){
|
||
|
QL_SSL_LOG("ssl handshake failed!!!!");
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_SUCCESS){
|
||
|
QL_SSL_LOG("ssl handshake completed!!!!");
|
||
|
ssl_hs_completed = 1;
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_READ){
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_WRITE){
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
if(FD_ISSET(socket_fd, &read_fds)){
|
||
|
FD_CLR(socket_fd, &read_fds);
|
||
|
if(ssl_hs_completed == 0){
|
||
|
ret = ql_ssl_handshake(&ssl_ctx);
|
||
|
if(!(ret == QL_SSL_SUCCESS || ret == QL_SSL_ERROR_WANT_READ||ret == QL_SSL_ERROR_WANT_WRITE)){
|
||
|
QL_SSL_LOG("ssl handshake failed!!!!");
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_SUCCESS){
|
||
|
QL_SSL_LOG("ssl handshake completed!!!!");
|
||
|
ssl_hs_completed = 1;
|
||
|
break;
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_READ){
|
||
|
FD_SET(socket_fd, &read_fds);
|
||
|
}else if(ret == QL_SSL_ERROR_WANT_WRITE){
|
||
|
FD_SET(socket_fd, &write_fds);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
if(FD_ISSET(socket_fd, &exp_fds)){
|
||
|
FD_CLR(socket_fd, &exp_fds);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
ql_ssl_conf_free(&ssl_cfg);
|
||
|
ql_ssl_free(&ssl_ctx);
|
||
|
close(socket_fd);
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
static void ssl_app_thread(void * arg)
|
||
|
{
|
||
|
int ret = 0;
|
||
|
int i = 0, run_num = 1;
|
||
|
int profile_idx = 1;
|
||
|
ql_data_call_info_s info;
|
||
|
char ip4_addr_str[16] = {0};
|
||
|
uint8_t nSim = 0;
|
||
|
|
||
|
|
||
|
ql_rtos_task_sleep_s(10);
|
||
|
QL_SSL_LOG("========== ssl demo start ==========");
|
||
|
QL_SSL_LOG("wait for network register done");
|
||
|
|
||
|
while((ret = ql_network_register_wait(nSim, 120)) != 0 && i < 10){
|
||
|
i++;
|
||
|
ql_rtos_task_sleep_s(1);
|
||
|
}
|
||
|
if(ret == 0){
|
||
|
i = 0;
|
||
|
QL_SSL_LOG("====network registered!!!!====");
|
||
|
}else{
|
||
|
QL_SSL_LOG("====network register failure!!!!!====");
|
||
|
goto exit;
|
||
|
}
|
||
|
|
||
|
ql_set_data_call_asyn_mode(nSim, profile_idx, 0);
|
||
|
|
||
|
QL_SSL_LOG("===start data call====");
|
||
|
ret=ql_start_data_call(nSim, profile_idx, QL_PDP_TYPE_IP, "uninet", NULL, NULL, 0);
|
||
|
QL_SSL_LOG("===data call result:%d", ret);
|
||
|
if(ret != 0){
|
||
|
QL_SSL_LOG("====data call failure!!!!=====");
|
||
|
}
|
||
|
memset(&info, 0x00, sizeof(ql_data_call_info_s));
|
||
|
|
||
|
ret = ql_get_data_call_info(nSim, profile_idx, &info);
|
||
|
if(ret != 0){
|
||
|
QL_SSL_LOG("ql_get_data_call_info ret: %d", ret);
|
||
|
ql_stop_data_call(nSim, profile_idx);
|
||
|
goto exit;
|
||
|
}
|
||
|
QL_SSL_LOG("info->profile_idx: %d", info.profile_idx);
|
||
|
QL_SSL_LOG("info->ip_version: %d", info.ip_version);
|
||
|
|
||
|
QL_SSL_LOG("info->v4.state: %d", info.v4.state);
|
||
|
inet_ntop(AF_INET, &info.v4.addr.ip, ip4_addr_str, sizeof(ip4_addr_str));
|
||
|
QL_SSL_LOG("info.v4.addr.ip: %s", ip4_addr_str);
|
||
|
|
||
|
inet_ntop(AF_INET, &info.v4.addr.pri_dns, ip4_addr_str, sizeof(ip4_addr_str));
|
||
|
QL_SSL_LOG("info.v4.addr.pri_dns: %s", ip4_addr_str);
|
||
|
|
||
|
inet_ntop(AF_INET, &info.v4.addr.sec_dns, ip4_addr_str, sizeof(ip4_addr_str));
|
||
|
QL_SSL_LOG("info.v4.addr.sec_dns: %s", ip4_addr_str);
|
||
|
while(run_num <= 100){
|
||
|
int case_id = run_num%3;
|
||
|
QL_SSL_LOG("==============ssl_demo_test_tls[%d]================",run_num);
|
||
|
if(case_id == 0){
|
||
|
ssl_test_tls_with_noblocking(profile_idx);
|
||
|
}else if(case_id == 1){
|
||
|
ssl_test_tls_with_blocking(profile_idx);
|
||
|
}
|
||
|
else if(case_id == 2)
|
||
|
{
|
||
|
#ifdef QL_SSL_TLS_SESSION_CACHE_FEATURE
|
||
|
ssl_test_tls_with_session_cache(profile_idx);
|
||
|
#endif
|
||
|
}
|
||
|
QL_SSL_LOG("==============ssl_demo_test_tls[%d] end================",run_num);
|
||
|
run_num++;
|
||
|
ql_rtos_task_sleep_s(1);
|
||
|
}
|
||
|
QL_SSL_LOG("==============ssl_demo_test_dtls================");
|
||
|
ssl_test_dtls(profile_idx);
|
||
|
QL_SSL_LOG("==============ssl_demo_test_dtls end================");
|
||
|
exit:
|
||
|
ql_rtos_task_delete(ssl_task);
|
||
|
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
int ql_ssl_app_init(void)
|
||
|
{
|
||
|
QlOSStatus err = QL_OSI_SUCCESS;
|
||
|
|
||
|
err = ql_rtos_task_create(&ssl_task, 16*1024, APP_PRIORITY_ABOVE_NORMAL, "QsslApp", ssl_app_thread, NULL, 5);
|
||
|
if(err != QL_OSI_SUCCESS)
|
||
|
{
|
||
|
QL_SSL_LOG("ssl_app init failed");
|
||
|
}
|
||
|
|
||
|
return err;
|
||
|
}
|
||
|
|