sctp-server-dtls.c 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. /* sctp-server-dtls.c
  2. *
  3. * Copyright (C) 2006-2017 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. /* sctp */
  22. #include <sys/socket.h>
  23. #include <sys/types.h>
  24. #include <netinet/in.h>
  25. /* std */
  26. #include <stdio.h>
  27. #include <stdlib.h>
  28. #include <string.h>
  29. #include <unistd.h>
  30. /* wolfssl */
  31. #include <wolfssl/options.h>
  32. #include <wolfssl/ssl.h>
  33. #define key "./certs/server-key.pem"
  34. #define cert "./certs/server-cert.pem"
  35. static int err_sys(const char* msg)
  36. {
  37. perror(msg);
  38. exit(EXIT_FAILURE);
  39. }
  40. int main()
  41. {
  42. int sd = socket(PF_INET, SOCK_STREAM, IPPROTO_SCTP);
  43. if (sd < 0)
  44. err_sys("sctp socket error");
  45. struct sockaddr_in sa;
  46. memset(&sa, 0, sizeof(sa));
  47. sa.sin_family = AF_INET;
  48. sa.sin_addr.s_addr = htonl(INADDR_ANY);
  49. sa.sin_port = htons(12345);
  50. int ret = bind(sd, (struct sockaddr*)&sa, sizeof(sa));
  51. if (ret < 0)
  52. err_sys("sctp bind error");
  53. listen(sd, 3);
  54. int client_sd = accept(sd, NULL, NULL);
  55. if (client_sd < 0)
  56. err_sys("sctp accept error");
  57. const char* response = "well hello to you";
  58. char buffer[80];
  59. WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method());
  60. if (ctx == NULL)
  61. err_sys("ctx new dtls server failed");
  62. ret = wolfSSL_CTX_dtls_set_sctp(ctx);
  63. if (ret != WOLFSSL_SUCCESS)
  64. err_sys("set sctp mode failed");
  65. ret = wolfSSL_CTX_use_PrivateKey_file(ctx, key, WOLFSSL_FILETYPE_PEM);
  66. if (ret != WOLFSSL_SUCCESS)
  67. err_sys("use private key error");
  68. ret = wolfSSL_CTX_use_certificate_file(ctx, cert, WOLFSSL_FILETYPE_PEM);
  69. if (ret != WOLFSSL_SUCCESS)
  70. err_sys("use cert error");
  71. WOLFSSL* ssl = wolfSSL_new(ctx);
  72. if (ssl == NULL)
  73. err_sys("ssl new dtls server failed");
  74. wolfSSL_set_fd(ssl, client_sd);
  75. ret = wolfSSL_accept(ssl);
  76. if (ret != WOLFSSL_SUCCESS)
  77. err_sys("ssl accept failed");
  78. printf("TLS version is %s\n", wolfSSL_get_version(ssl));
  79. printf("Cipher Suite is %s\n",
  80. wolfSSL_CIPHER_get_name(wolfSSL_get_current_cipher(ssl)));
  81. int got = wolfSSL_read(ssl, buffer, sizeof(buffer));
  82. if (got > 0) {
  83. buffer[got] = 0;
  84. printf("client said: %s\n", buffer);
  85. }
  86. wolfSSL_write(ssl, response, (int)strlen(response));
  87. unsigned char bigBuf[4096];
  88. wolfSSL_read(ssl, bigBuf, sizeof(bigBuf));
  89. wolfSSL_write(ssl, bigBuf, sizeof(bigBuf));
  90. wolfSSL_shutdown(ssl);
  91. wolfSSL_free(ssl);
  92. wolfSSL_CTX_free(ctx);
  93. close(sd);
  94. return 0;
  95. }