123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130 |
- /* sctp-server-dtls.c
- *
- * Copyright (C) 2006-2023 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- /* wolfssl */
- #ifndef WOLFSSL_USER_SETTINGS
- #include <wolfssl/options.h>
- #endif
- #include <wolfssl/wolfcrypt/settings.h>
- #include <wolfssl/ssl.h>
- #if defined(WOLFSSL_SCTP) && defined(WOLFSSL_DTLS) && !defined(WOLFSSL_NO_TLS12)
- /* sctp */
- #include <sys/socket.h>
- #include <sys/types.h>
- #include <netinet/in.h>
- /* std */
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include <unistd.h>
- #define key "./certs/server-key.pem"
- #define cert "./certs/server-cert.pem"
- static int err_sys(const char* msg)
- {
- perror(msg);
- exit(EXIT_FAILURE);
- }
- #endif /* WOLFSSL_SCTP && WOLFSSL_DTLS && !WOLFSSL_NO_TLS12 */
- int main(int argc, char **argv)
- {
- (void)argc;
- (void)argv;
- #if defined(WOLFSSL_SCTP) && defined(WOLFSSL_DTLS) && !defined(WOLFSSL_NO_TLS12)
- int sd = socket(PF_INET, SOCK_STREAM, IPPROTO_SCTP);
- if (sd < 0)
- err_sys("sctp socket error");
- struct sockaddr_in sa;
- memset(&sa, 0, sizeof(sa));
- sa.sin_family = AF_INET;
- sa.sin_addr.s_addr = htonl(INADDR_ANY);
- sa.sin_port = htons(12345);
- int ret = bind(sd, (struct sockaddr*)&sa, sizeof(sa));
- if (ret < 0)
- err_sys("sctp bind error");
- listen(sd, 3);
- int client_sd = accept(sd, NULL, NULL);
- if (client_sd < 0)
- err_sys("sctp accept error");
- const char* response = "well hello to you";
- char buffer[80];
- WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method());
- if (ctx == NULL)
- err_sys("ctx new dtls server failed");
- ret = wolfSSL_CTX_dtls_set_sctp(ctx);
- if (ret != WOLFSSL_SUCCESS)
- err_sys("set sctp mode failed");
- ret = wolfSSL_CTX_use_PrivateKey_file(ctx, key, WOLFSSL_FILETYPE_PEM);
- if (ret != WOLFSSL_SUCCESS)
- err_sys("use private key error");
- ret = wolfSSL_CTX_use_certificate_file(ctx, cert, WOLFSSL_FILETYPE_PEM);
- if (ret != WOLFSSL_SUCCESS)
- err_sys("use cert error");
- WOLFSSL* ssl = wolfSSL_new(ctx);
- if (ssl == NULL)
- err_sys("ssl new dtls server failed");
- wolfSSL_set_fd(ssl, client_sd);
- ret = wolfSSL_accept(ssl);
- if (ret != WOLFSSL_SUCCESS)
- err_sys("ssl accept failed");
- printf("TLS version is %s\n", wolfSSL_get_version(ssl));
- printf("Cipher Suite is %s\n",
- wolfSSL_CIPHER_get_name(wolfSSL_get_current_cipher(ssl)));
- int got = wolfSSL_read(ssl, buffer, sizeof(buffer));
- if (got > 0) {
- buffer[got] = 0;
- printf("client said: %s\n", buffer);
- }
- wolfSSL_write(ssl, response, (int)strlen(response));
- unsigned char bigBuf[4096];
- wolfSSL_read(ssl, bigBuf, sizeof(bigBuf));
- wolfSSL_write(ssl, bigBuf, sizeof(bigBuf));
- wolfSSL_shutdown(ssl);
- wolfSSL_free(ssl);
- wolfSSL_CTX_free(ctx);
- close(sd);
- #endif /* WOLFSSL_SCTP && WOLFSSL_DTLS && !WOLFSSL_NO_TLS12 */
- return 0;
- }
|