Corrected bugs in record parsing.
[gnutls.git] / tests / pskself.c
blobf6eed94c69f062a094a5de3da22825817a221b29
1 /*
2 * Copyright (C) 2004-2012 Free Software Foundation, Inc.
4 * Author: Simon Josefsson
6 * This file is part of GnuTLS.
8 * GnuTLS is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * GnuTLS is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with GnuTLS; if not, write to the Free Software Foundation,
20 * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
23 /* Parts copied from GnuTLS example programs. */
25 #ifdef HAVE_CONFIG_H
26 #include <config.h>
27 #endif
29 #include <stdio.h>
30 #include <stdlib.h>
31 #include <string.h>
32 #include <sys/types.h>
33 #include <sys/socket.h>
34 #if !defined(_WIN32)
35 #include <sys/wait.h>
36 #include <netinet/in.h>
37 #include <arpa/inet.h>
38 #endif
39 #include <unistd.h>
40 #include <gnutls/gnutls.h>
42 #include "tcp.c"
44 #include "utils.h"
46 /* A very basic TLS client, with PSK authentication.
49 const char* side = "";
51 static void
52 tls_log_func (int level, const char *str)
54 fprintf (stderr, "%s|<%d>| %s", side, level, str);
57 #define MAX_BUF 1024
58 #define MSG "Hello TLS"
60 static void
61 client (void)
63 int ret, sd, ii;
64 gnutls_session_t session;
65 char buffer[MAX_BUF + 1];
66 gnutls_psk_client_credentials_t pskcred;
67 /* Need to enable anonymous KX specifically. */
68 const gnutls_datum_t key = { (void *) "DEADBEEF", 8 };
70 gnutls_global_init ();
71 gnutls_global_set_log_function (tls_log_func);
72 if (debug)
73 gnutls_global_set_log_level (4711);
75 side = "client";
77 gnutls_psk_allocate_client_credentials (&pskcred);
78 gnutls_psk_set_client_credentials (pskcred, "test", &key,
79 GNUTLS_PSK_KEY_HEX);
81 /* Initialize TLS session
83 gnutls_init (&session, GNUTLS_CLIENT);
85 /* Use default priorities */
86 gnutls_priority_set_direct (session, "NORMAL:+PSK", NULL);
88 /* put the anonymous credentials to the current session
90 gnutls_credentials_set (session, GNUTLS_CRD_PSK, pskcred);
92 /* connect to the peer
94 sd = tcp_connect ();
96 gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) sd);
98 /* Perform the TLS handshake
100 ret = gnutls_handshake (session);
102 if (ret < 0)
104 fail ("client: Handshake failed\n");
105 gnutls_perror (ret);
106 goto end;
108 else
110 if (debug)
111 success ("client: Handshake was completed\n");
114 gnutls_record_send (session, MSG, strlen (MSG));
116 ret = gnutls_record_recv (session, buffer, MAX_BUF);
117 if (ret == 0)
119 if (debug)
120 success ("client: Peer has closed the TLS connection\n");
121 goto end;
123 else if (ret < 0)
125 fail ("client: Error: %s\n", gnutls_strerror (ret));
126 goto end;
129 if (debug)
131 printf ("- Received %d bytes: ", ret);
132 for (ii = 0; ii < ret; ii++)
134 fputc (buffer[ii], stdout);
136 fputs ("\n", stdout);
139 gnutls_bye (session, GNUTLS_SHUT_RDWR);
141 end:
143 tcp_close (sd);
145 gnutls_deinit (session);
147 gnutls_psk_free_client_credentials (pskcred);
149 gnutls_global_deinit ();
152 /* This is a sample TLS 1.0 echo server, for PSK authentication.
155 #define SA struct sockaddr
156 #define MAX_BUF 1024
157 #define PORT 5556 /* listen to 5556 port */
159 /* These are global */
160 gnutls_psk_server_credentials_t server_pskcred;
162 static gnutls_session_t
163 initialize_tls_session (void)
165 gnutls_session_t session;
167 gnutls_init (&session, GNUTLS_SERVER);
169 /* avoid calling all the priority functions, since the defaults
170 * are adequate.
172 gnutls_priority_set_direct (session, "NORMAL:+PSK", NULL);
174 gnutls_credentials_set (session, GNUTLS_CRD_PSK, server_pskcred);
176 return session;
179 static int
180 pskfunc (gnutls_session_t session, const char *username, gnutls_datum_t * key)
182 if (debug)
183 printf ("psk: username %s\n", username);
184 key->data = gnutls_malloc (4);
185 key->data[0] = 0xDE;
186 key->data[1] = 0xAD;
187 key->data[2] = 0xBE;
188 key->data[3] = 0xEF;
189 key->size = 4;
190 return 0;
193 int err, listen_sd, i;
194 int sd, ret;
195 struct sockaddr_in sa_serv;
196 struct sockaddr_in sa_cli;
197 socklen_t client_len;
198 char topbuf[512];
199 gnutls_session_t session;
200 char buffer[MAX_BUF + 1];
201 int optval = 1;
203 static void
204 server_start (void)
206 if (debug)
207 success ("Launched...\n");
209 /* Socket operations
211 listen_sd = socket (AF_INET, SOCK_STREAM, 0);
212 if (err == -1)
214 perror ("socket");
215 fail ("server: socket failed\n");
216 return;
219 memset (&sa_serv, '\0', sizeof (sa_serv));
220 sa_serv.sin_family = AF_INET;
221 sa_serv.sin_addr.s_addr = INADDR_ANY;
222 sa_serv.sin_port = htons (PORT); /* Server Port number */
224 setsockopt (listen_sd, SOL_SOCKET, SO_REUSEADDR, (void *) &optval,
225 sizeof (int));
227 err = bind (listen_sd, (SA *) & sa_serv, sizeof (sa_serv));
228 if (err == -1)
230 perror ("bind");
231 fail ("server: bind failed\n");
232 return;
235 err = listen (listen_sd, 1024);
236 if (err == -1)
238 perror ("listen");
239 fail ("server: listen failed\n");
240 return;
243 if (debug)
244 success ("server: ready. Listening to port '%d'.\n", PORT);
247 static void
248 server (void)
250 /* this must be called once in the program
252 gnutls_global_init ();
253 gnutls_global_set_log_function (tls_log_func);
254 if (debug)
255 gnutls_global_set_log_level (4711);
257 side = "server";
259 gnutls_psk_allocate_server_credentials (&server_pskcred);
260 gnutls_psk_set_server_credentials_function (server_pskcred, pskfunc);
262 client_len = sizeof (sa_cli);
264 session = initialize_tls_session ();
266 sd = accept (listen_sd, (SA *) & sa_cli, &client_len);
268 if (debug)
269 success ("server: connection from %s, port %d\n",
270 inet_ntop (AF_INET, &sa_cli.sin_addr, topbuf,
271 sizeof (topbuf)), ntohs (sa_cli.sin_port));
273 gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) sd);
274 ret = gnutls_handshake (session);
275 if (ret < 0)
277 close (sd);
278 gnutls_deinit (session);
279 fail ("server: Handshake has failed (%s)\n\n", gnutls_strerror (ret));
280 return;
282 if (debug)
283 success ("server: Handshake was completed\n");
285 /* see the Getting peer's information example */
286 /* print_info(session); */
288 i = 0;
289 for (;;)
291 memset (buffer, 0, MAX_BUF + 1);
292 ret = gnutls_record_recv (session, buffer, MAX_BUF);
294 if (ret == 0)
296 if (debug)
297 success ("server: Peer has closed the GnuTLS connection\n");
298 break;
300 else if (ret < 0)
302 fail ("server: Received corrupted data(%d). Closing...\n", ret);
303 break;
305 else if (ret > 0)
307 /* echo data back to the client
309 gnutls_record_send (session, buffer, strlen (buffer));
312 /* do not wait for the peer to close the connection.
314 gnutls_bye (session, GNUTLS_SHUT_WR);
316 close (sd);
317 gnutls_deinit (session);
319 close (listen_sd);
321 gnutls_psk_free_server_credentials (server_pskcred);
323 gnutls_global_deinit ();
325 if (debug)
326 success ("server: finished\n");
329 void
330 doit (void)
332 pid_t child;
334 server_start ();
335 if (error_count)
336 return;
338 child = fork ();
339 if (child < 0)
341 perror ("fork");
342 fail ("fork");
343 return;
346 if (child)
348 int status;
349 /* parent */
350 server ();
351 wait (&status);
353 else
354 client ();