2021-01-20 23:14:11 -05:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
2021-10-08 04:49:57 -04:00
|
|
|
# SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD
|
|
|
|
# SPDX-License-Identifier: Apache-2.0
|
2021-01-20 23:14:11 -05:00
|
|
|
|
|
|
|
import http.client
|
|
|
|
import os
|
|
|
|
import re
|
|
|
|
import ssl
|
|
|
|
|
|
|
|
import tiny_test_fw
|
|
|
|
import ttfw_idf
|
|
|
|
from tiny_test_fw import Utility
|
|
|
|
|
|
|
|
server_cert_pem = '-----BEGIN CERTIFICATE-----\n'\
|
|
|
|
'MIIDKzCCAhOgAwIBAgIUBxM3WJf2bP12kAfqhmhhjZWv0ukwDQYJKoZIhvcNAQEL\n'\
|
|
|
|
'BQAwJTEjMCEGA1UEAwwaRVNQMzIgSFRUUFMgc2VydmVyIGV4YW1wbGUwHhcNMTgx\n'\
|
|
|
|
'MDE3MTEzMjU3WhcNMjgxMDE0MTEzMjU3WjAlMSMwIQYDVQQDDBpFU1AzMiBIVFRQ\n'\
|
|
|
|
'UyBzZXJ2ZXIgZXhhbXBsZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB\n'\
|
|
|
|
'ALBint6nP77RCQcmKgwPtTsGK0uClxg+LwKJ3WXuye3oqnnjqJCwMEneXzGdG09T\n'\
|
|
|
|
'sA0SyNPwrEgebLCH80an3gWU4pHDdqGHfJQa2jBL290e/5L5MB+6PTs2NKcojK/k\n'\
|
|
|
|
'qcZkn58MWXhDW1NpAnJtjVniK2Ksvr/YIYSbyD+JiEs0MGxEx+kOl9d7hRHJaIzd\n'\
|
|
|
|
'GF/vO2pl295v1qXekAlkgNMtYIVAjUy9CMpqaQBCQRL+BmPSJRkXBsYk8GPnieS4\n'\
|
|
|
|
'sUsp53DsNvCCtWDT6fd9D1v+BB6nDk/FCPKhtjYOwOAZlX4wWNSZpRNr5dfrxKsb\n'\
|
|
|
|
'jAn4PCuR2akdF4G8WLUeDWECAwEAAaNTMFEwHQYDVR0OBBYEFMnmdJKOEepXrHI/\n'\
|
|
|
|
'ivM6mVqJgAX8MB8GA1UdIwQYMBaAFMnmdJKOEepXrHI/ivM6mVqJgAX8MA8GA1Ud\n'\
|
|
|
|
'EwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBADiXIGEkSsN0SLSfCF1VNWO3\n'\
|
|
|
|
'emBurfOcDq4EGEaxRKAU0814VEmU87btIDx80+z5Dbf+GGHCPrY7odIkxGNn0DJY\n'\
|
|
|
|
'W1WcF+DOcbiWoUN6DTkAML0SMnp8aGj9ffx3x+qoggT+vGdWVVA4pgwqZT7Ybntx\n'\
|
|
|
|
'bkzcNFW0sqmCv4IN1t4w6L0A87ZwsNwVpre/j6uyBw7s8YoJHDLRFT6g7qgn0tcN\n'\
|
|
|
|
'ZufhNISvgWCVJQy/SZjNBHSpnIdCUSJAeTY2mkM4sGxY0Widk8LnjydxZUSxC3Nl\n'\
|
|
|
|
'hb6pnMh3jRq4h0+5CZielA4/a+TdrNPv/qok67ot/XJdY3qHCCd8O2b14OVq9jo=\n'\
|
|
|
|
'-----END CERTIFICATE-----\n'
|
|
|
|
|
2021-10-08 04:49:57 -04:00
|
|
|
client_cert_pem = '-----BEGIN CERTIFICATE-----\n' \
|
|
|
|
'MIID7TCCAtWgAwIBAgIUBdm7RStsshnl3CCpknSJhXQK4GcwDQYJKoZIhvcNAQEL\n' \
|
|
|
|
'BQAwgYUxCzAJBgNVBAYTAkNOMRAwDgYDVQQIDAdKaWFuZ3N1MQ8wDQYDVQQHDAZT\n' \
|
|
|
|
'dXpob3UxEjAQBgNVBAoMCUVzcHJlc3NpZjEMMAoGA1UECwwDY29tMRIwEAYDVQQD\n' \
|
|
|
|
'DAkxMjcuMC4wLjExHTAbBgkqhkiG9w0BCQEWDmVzcDMyeEBlc3AuY29tMB4XDTIx\n' \
|
|
|
|
'MTAwNTExMTMxMFoXDTMxMTAwMzExMTMxMFowgYUxCzAJBgNVBAYTAkNOMRAwDgYD\n' \
|
|
|
|
'VQQIDAdKaWFuZ3N1MQ8wDQYDVQQHDAZTdXpob3UxEjAQBgNVBAoMCUVzcHJlc3Np\n' \
|
|
|
|
'ZjEMMAoGA1UECwwDY29tMRIwEAYDVQQDDAkxMjcuMC4wLjExHTAbBgkqhkiG9w0B\n' \
|
|
|
|
'CQEWDmVzcDMyeEBlc3AuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC\n' \
|
|
|
|
'AQEAu2nP0HPtgKvRUwFuOs72caf4oyeK33OVfa6fGGttr/QYyw9PrwtdFDyEWEiI\n' \
|
|
|
|
'4P4hnxNC+bvNSYtJUzF9EmkqrUtKxhBsRVTKWOqumcgtiMWOxpdVKl0936ne2Pqh\n' \
|
|
|
|
'SweddrQwvPDFuB3hRikRX11+d5vkjFBV9FoZobKHWemDkXSc2R99xRie5PJoEfoz\n' \
|
|
|
|
'rmu5zjCaPHxzkyZsmH4MILfTuhUGc/Eye9Nl+lpY5KLjM14ZMQLK1CHRuI/oqCN6\n' \
|
|
|
|
'1WQrgUY5EyXGe0jXHTVhlL2RN8njxJ/4r3JnK/BQkcXTIMPOP8jIv9Sy1HhxfXKy\n' \
|
|
|
|
'HzLqOBn0Ft+mOADrpAWX8WnwUQIDAQABo1MwUTAdBgNVHQ4EFgQUpu4d8d+IywjB\n' \
|
|
|
|
'HMiKX84L+1ri8BIwHwYDVR0jBBgwFoAUpu4d8d+IywjBHMiKX84L+1ri8BIwDwYD\n' \
|
|
|
|
'VR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAXm5Hn/aKKO3RnHqqfxok\n' \
|
|
|
|
'Hbw5yA2L2T6VPj2puI0Sh5GW62INjM0Kszy3L5mQqLUSsjcEcFAZmpeo14ytPRLG\n' \
|
|
|
|
'o6+WG/4er3hBA7D8oDni7hp8Qs+/EtNuEuoU+qQiKsT2DvA5rafT7laNfvjgqaoJ\n' \
|
|
|
|
'YMTCvzKLnMBaglB+qC9grgvJwMN0RTzHyY6UySdNZmcf5QXWLWjsX8E8/u4iSq8l\n' \
|
|
|
|
'eZlddTjh7HGGEOim7AkvKR9VYAvKGOV+FvUzCxPpoTr6kS2NGwnR7QnvKADECtLj\n' \
|
|
|
|
'gf+hW1FalMn0yTVspg4+BNbIThh0thbsvPDUTekMNfaRKKHZpJP2Ty3LkCbANLBR\n' \
|
|
|
|
'tQ==\n' \
|
|
|
|
'-----END CERTIFICATE-----\n'
|
|
|
|
|
|
|
|
|
|
|
|
client_key_pem = '-----BEGIN PRIVATE KEY-----\n' \
|
|
|
|
'MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC7ac/Qc+2Aq9FT\n' \
|
|
|
|
'AW46zvZxp/ijJ4rfc5V9rp8Ya22v9BjLD0+vC10UPIRYSIjg/iGfE0L5u81Ji0lT\n' \
|
|
|
|
'MX0SaSqtS0rGEGxFVMpY6q6ZyC2IxY7Gl1UqXT3fqd7Y+qFLB512tDC88MW4HeFG\n' \
|
|
|
|
'KRFfXX53m+SMUFX0WhmhsodZ6YORdJzZH33FGJ7k8mgR+jOua7nOMJo8fHOTJmyY\n' \
|
|
|
|
'fgwgt9O6FQZz8TJ702X6WljkouMzXhkxAsrUIdG4j+ioI3rVZCuBRjkTJcZ7SNcd\n' \
|
|
|
|
'NWGUvZE3yePEn/ivcmcr8FCRxdMgw84/yMi/1LLUeHF9crIfMuo4GfQW36Y4AOuk\n' \
|
|
|
|
'BZfxafBRAgMBAAECggEBAJuJZ1UCwRtGfUS8LTVVSiZtVuZhDNoB3REfeR4VGkUq\n' \
|
|
|
|
'+eCcZm9JqQgAaX2zRRYlEtYocC8+c1MT69jFe51p9mc302ipfJHVmtFMg3dRMKkP\n' \
|
|
|
|
'/DxIn/+2voD/Q9kjt/TC7yXyyXglApKZCbrmnmpc93ZgxL7GdW+Dzz3pIne2WuC9\n' \
|
|
|
|
'T6ie71R8X60sau6ApMgkUq6On0f21v/VLkNU67tQJGBF6Q1HE8PK7Ptun3WSBVNm\n' \
|
|
|
|
'FNNJKRBwiqfWXe9hPlqqCWayYBrojSqJJXn5Xd6n5XzLDPzAXuPlkPF3VwWeXGam\n' \
|
|
|
|
'3RBZA26gwv50E1PeiUQOipkR57J+O9j/oA07AnhsxPkCgYEA8RMvE3ImZTkPVqdX\n' \
|
|
|
|
'72E2A5ScJswVvZelnRS/mG8U+8UlvevAu5MYr717DHKHy3yOw/u7wbkqk6KEIcyz\n' \
|
|
|
|
'ctNPBPqTweaZ28eEY/+lXSdQaWLD2UgZC8JIcMOSeFugghEHeBaxLzUYBNDToE3q\n' \
|
|
|
|
'1El2HJ7W14QuTA+CEtCEb+tc7ssCgYEAxwQkBTT8A7mOEE0phfUACqaBuAXld+zu\n' \
|
|
|
|
'I3PNJDIhg1ZABEJ9vo9+3duFDoEHVsJOetijrBBxf/XAvi3bTJ+gAjcA54cGpkxz\n' \
|
|
|
|
'6ssbFWZeC9exyo0ILKn33o716GrCvQn1kmuF2gasmAcrOVsMygawR7P02oasDP/X\n' \
|
|
|
|
'UckbZdqofdMCgYEAom0GfteePv0e9Idzm/mnZuot+4Xt7/vIvflIze+p96hxMXEy\n' \
|
|
|
|
'Pi9xppbH3S8dh2C44Bsv+epEYYxR8mP1VBxDVVtvSmmQqJ/Y93c7d3QRna/JvQ/y\n' \
|
|
|
|
'sBWKsU9T1HwHvRq0KZlAcEoZkMUSkSNuYPHN/qKWpkaM2vpn7T1Ivg+aYdkCgYA/\n' \
|
|
|
|
'CGO0NnzfXSTOqvHM2LVDqksJkuyD2Enwdpvxq+MLawTplHmpIl/HOuDgoCNH6lDa\n' \
|
|
|
|
'/cSRGcApDBgY5ANCOIiASxWBPzXu8+X+5odUdtCwpYdNJPAC3W6BUfw2uaGmKAJc\n' \
|
|
|
|
'dqu1S0nc+OBK0Tiyv/2TKD8T+3WAxINZBv4je2bEOwKBgEavm5zTN9NILJsJCf9k\n' \
|
|
|
|
'te7+uDFuyoNWkL1vmMPuJYVC1QMVq1yr3DSaxA19BG9P4ZyOMOwVlPVWA+LofD4D\n' \
|
|
|
|
'S+w4Jjl2KDI4tSLUr6bsAJWdDfmrmGmRN3Kpds4RXaymV3rjj7qRk1J+ivtwo89s\n' \
|
|
|
|
'Vj+VslYzxw7FKKmnBgh/qGbJ\n' \
|
|
|
|
'-----END PRIVATE KEY-----\n'
|
|
|
|
|
2021-01-20 23:14:11 -05:00
|
|
|
success_response = '<h1>Hello Secure World!</h1>'
|
|
|
|
|
|
|
|
|
2021-03-25 05:50:30 -04:00
|
|
|
@ttfw_idf.idf_example_test(env_tag='Example_WIFI_Protocols')
|
2021-01-20 23:14:11 -05:00
|
|
|
def test_examples_protocol_https_server_simple(env, extra_data): # type: (tiny_test_fw.Env.Env, None) -> None # pylint: disable=unused-argument
|
|
|
|
"""
|
|
|
|
steps: |
|
|
|
|
1. join AP
|
|
|
|
2. connect to www.howsmyssl.com:443
|
|
|
|
3. send http request
|
|
|
|
"""
|
|
|
|
dut1 = env.get_dut('https_server_simple', 'examples/protocols/https_server/simple', dut_class=ttfw_idf.ESP32DUT)
|
|
|
|
# check and log bin size
|
|
|
|
binary_file = os.path.join(dut1.app.binary_path, 'https_server.bin')
|
|
|
|
bin_size = os.path.getsize(binary_file)
|
|
|
|
ttfw_idf.log_performance('https_server_simple_bin_size', '{}KB'.format(bin_size // 1024))
|
|
|
|
# start test
|
|
|
|
dut1.start_app()
|
|
|
|
# Parse IP address and port of the server
|
|
|
|
dut1.expect(re.compile(r'Starting server'))
|
|
|
|
got_port = dut1.expect(re.compile(r'Server listening on port (\d+)'), timeout=30)[0]
|
|
|
|
Utility.console_log('Waiting to connect with AP')
|
|
|
|
|
|
|
|
got_ip = dut1.expect(re.compile(r'IPv4 address: (\d+\.\d+\.\d+\.\d+)'), timeout=30)[0]
|
|
|
|
# Expected logs
|
|
|
|
|
|
|
|
Utility.console_log('Got IP : ' + got_ip)
|
|
|
|
Utility.console_log('Got Port : ' + got_port)
|
|
|
|
|
|
|
|
Utility.console_log('Performing GET request over an SSL connection with the server')
|
|
|
|
|
2021-10-08 04:49:57 -04:00
|
|
|
CLIENT_CERT_FILE = 'client_cert.pem'
|
|
|
|
CLIENT_KEY_FILE = 'client_key.pem'
|
|
|
|
|
2021-01-20 23:14:11 -05:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
|
|
|
|
ssl_context.verify_mode = ssl.CERT_REQUIRED
|
|
|
|
ssl_context.check_hostname = False
|
|
|
|
ssl_context.load_verify_locations(cadata=server_cert_pem)
|
2021-10-08 04:49:57 -04:00
|
|
|
|
|
|
|
with open(CLIENT_CERT_FILE, 'w') as cert, open(CLIENT_KEY_FILE, 'w') as key:
|
|
|
|
cert.write(client_cert_pem)
|
|
|
|
key.write(client_key_pem)
|
|
|
|
|
|
|
|
ssl_context.load_cert_chain(certfile=CLIENT_CERT_FILE, keyfile=CLIENT_KEY_FILE)
|
|
|
|
|
2022-05-11 05:18:12 -04:00
|
|
|
conn = http.client.HTTPSConnection(got_ip, got_port, context=ssl_context)
|
|
|
|
Utility.console_log('Performing SSL handshake with the server')
|
|
|
|
conn.request('GET','/')
|
|
|
|
resp = conn.getresponse()
|
|
|
|
dut1.expect('performing session handshake')
|
|
|
|
got_resp = resp.read().decode('utf-8')
|
|
|
|
if got_resp != success_response:
|
|
|
|
Utility.console_log('Response obtained does not match with correct response')
|
|
|
|
raise RuntimeError('Failed to test SSL connection')
|
|
|
|
|
|
|
|
# Close the connection
|
|
|
|
conn.close()
|
|
|
|
|
|
|
|
Utility.console_log('Checking user callback: Obtaining client certificate...')
|
|
|
|
|
|
|
|
serial_number = dut1.expect(re.compile(r'serial number(.*)'), timeout=5)[0]
|
|
|
|
issuer_name = dut1.expect(re.compile(r'issuer name(.*)'), timeout=5)[0]
|
|
|
|
expiry = dut1.expect(re.compile(r'expires on(.*)'), timeout=5)[0]
|
|
|
|
|
|
|
|
Utility.console_log('Serial No.' + serial_number)
|
|
|
|
Utility.console_log('Issuer Name' + issuer_name)
|
|
|
|
Utility.console_log('Expires on' + expiry)
|
|
|
|
|
|
|
|
Utility.console_log('Correct response obtained')
|
|
|
|
Utility.console_log('SSL connection test successful\nClosing the connection')
|
|
|
|
|
|
|
|
# Test with mbedTLS dynamic buffer feature
|
|
|
|
dut1 = env.get_dut('https_server_simple', 'examples/protocols/https_server/simple', dut_class=ttfw_idf.ESP32DUT, app_config_name='dynamic_buffer')
|
|
|
|
|
|
|
|
# start test
|
|
|
|
dut1.start_app()
|
|
|
|
# Parse IP address and port of the server
|
|
|
|
dut1.expect(re.compile(r'Starting server'))
|
|
|
|
got_port = dut1.expect(re.compile(r'Server listening on port (\d+)'), timeout=30)[0]
|
|
|
|
Utility.console_log('Waiting to connect with AP')
|
|
|
|
|
|
|
|
got_ip = dut1.expect(re.compile(r'IPv4 address: (\d+\.\d+\.\d+\.\d+)'), timeout=30)[0]
|
|
|
|
# Expected logs
|
|
|
|
|
|
|
|
Utility.console_log('Got IP : ' + got_ip)
|
|
|
|
Utility.console_log('Got Port : ' + got_port)
|
|
|
|
|
|
|
|
Utility.console_log('Performing GET request over an SSL connection with the server')
|
|
|
|
|
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLSv1_2)
|
|
|
|
ssl_context.verify_mode = ssl.CERT_REQUIRED
|
|
|
|
ssl_context.check_hostname = False
|
|
|
|
ssl_context.load_verify_locations(cadata=server_cert_pem)
|
|
|
|
|
|
|
|
ssl_context.load_cert_chain(certfile=CLIENT_CERT_FILE, keyfile=CLIENT_KEY_FILE)
|
|
|
|
|
2021-10-08 04:49:57 -04:00
|
|
|
os.remove(CLIENT_CERT_FILE)
|
|
|
|
os.remove(CLIENT_KEY_FILE)
|
|
|
|
|
2021-01-20 23:14:11 -05:00
|
|
|
conn = http.client.HTTPSConnection(got_ip, got_port, context=ssl_context)
|
|
|
|
Utility.console_log('Performing SSL handshake with the server')
|
|
|
|
conn.request('GET','/')
|
|
|
|
resp = conn.getresponse()
|
|
|
|
dut1.expect('performing session handshake')
|
|
|
|
got_resp = resp.read().decode('utf-8')
|
|
|
|
# Close the connection
|
|
|
|
if got_resp != success_response:
|
|
|
|
Utility.console_log('Response obtained does not match with correct response')
|
|
|
|
raise RuntimeError('Failed to test SSL connection')
|
|
|
|
|
2022-05-11 05:18:12 -04:00
|
|
|
# Close the connection
|
|
|
|
conn.close()
|
|
|
|
|
2021-10-08 04:49:57 -04:00
|
|
|
Utility.console_log('Checking user callback: Obtaining client certificate...')
|
|
|
|
|
|
|
|
serial_number = dut1.expect(re.compile(r'serial number(.*)'), timeout=5)[0]
|
|
|
|
issuer_name = dut1.expect(re.compile(r'issuer name(.*)'), timeout=5)[0]
|
|
|
|
expiry = dut1.expect(re.compile(r'expires on(.*)'), timeout=5)[0]
|
|
|
|
|
|
|
|
Utility.console_log('Serial No.' + serial_number)
|
|
|
|
Utility.console_log('Issuer Name' + issuer_name)
|
|
|
|
Utility.console_log('Expires on' + expiry)
|
|
|
|
|
2021-01-20 23:14:11 -05:00
|
|
|
Utility.console_log('Correct response obtained')
|
|
|
|
Utility.console_log('SSL connection test successful\nClosing the connection')
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
test_examples_protocol_https_server_simple() # pylint: disable=no-value-for-parameter
|