2016-11-17 21:07:34 -05:00
|
|
|
/* OpenSSL client Example
|
|
|
|
|
|
|
|
This example code is in the Public Domain (or CC0 licensed, at your option.)
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, this
|
|
|
|
software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
|
|
|
|
CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
*/
|
2016-11-15 22:11:01 -05:00
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
#include "openssl_client_example.h"
|
2016-11-15 22:11:01 -05:00
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "openssl/ssl.h"
|
|
|
|
|
|
|
|
#include "freertos/FreeRTOS.h"
|
|
|
|
#include "freertos/task.h"
|
|
|
|
#include "freertos/event_groups.h"
|
|
|
|
|
|
|
|
#include "esp_log.h"
|
|
|
|
#include "esp_wifi.h"
|
|
|
|
#include "esp_event_loop.h"
|
|
|
|
|
|
|
|
#include "nvs_flash.h"
|
|
|
|
|
|
|
|
#include "lwip/sockets.h"
|
|
|
|
#include "lwip/netdb.h"
|
|
|
|
|
|
|
|
static EventGroupHandle_t wifi_event_group;
|
|
|
|
|
|
|
|
/* The event group allows multiple bits for each event,
|
|
|
|
but we only care about one event - are we connected
|
|
|
|
to the AP with an IP? */
|
|
|
|
const static int CONNECTED_BIT = BIT0;
|
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
const static char *TAG = "openssl_example";
|
2016-11-15 22:11:01 -05:00
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
static void openssl_example_task(void *p)
|
2016-11-15 22:11:01 -05:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
SSL_CTX *ctx;
|
|
|
|
SSL *ssl;
|
|
|
|
int socket;
|
|
|
|
struct sockaddr_in sock_addr;
|
|
|
|
struct hostent *hp;
|
|
|
|
struct ip4_addr *ip4_addr;
|
|
|
|
|
|
|
|
int recv_bytes = 0;
|
2017-03-22 00:36:11 -04:00
|
|
|
char recv_buf[OPENSSL_EXAMPLE_RECV_BUF_LEN];
|
2016-11-15 22:11:01 -05:00
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
const char send_data[] = OPENSSL_EXAMPLE_REQUEST;
|
2016-11-15 22:11:01 -05:00
|
|
|
const int send_bytes = sizeof(send_data);
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "OpenSSL demo thread start OK");
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "get target IP address");
|
2017-03-22 00:36:11 -04:00
|
|
|
hp = gethostbyname(OPENSSL_EXAMPLE_TARGET_NAME);
|
2016-11-15 22:11:01 -05:00
|
|
|
if (!hp) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed1;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
ip4_addr = (struct ip4_addr *)hp->h_addr;
|
|
|
|
ESP_LOGI(TAG, IPSTR, IP2STR(ip4_addr));
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "create SSL context ......");
|
|
|
|
ctx = SSL_CTX_new(TLSv1_1_client_method());
|
|
|
|
if (!ctx) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed1;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "create socket ......");
|
|
|
|
socket = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (socket < 0) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed2;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "bind socket ......");
|
|
|
|
memset(&sock_addr, 0, sizeof(sock_addr));
|
|
|
|
sock_addr.sin_family = AF_INET;
|
|
|
|
sock_addr.sin_addr.s_addr = 0;
|
2017-03-22 00:36:11 -04:00
|
|
|
sock_addr.sin_port = htons(OPENSSL_EXAMPLE_LOCAL_TCP_PORT);
|
2016-11-15 22:11:01 -05:00
|
|
|
ret = bind(socket, (struct sockaddr*)&sock_addr, sizeof(sock_addr));
|
|
|
|
if (ret) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed3;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
ESP_LOGI(TAG, "socket connect to remote %s ......", OPENSSL_EXAMPLE_TARGET_NAME);
|
2016-11-15 22:11:01 -05:00
|
|
|
memset(&sock_addr, 0, sizeof(sock_addr));
|
|
|
|
sock_addr.sin_family = AF_INET;
|
|
|
|
sock_addr.sin_addr.s_addr = ip4_addr->addr;
|
2017-03-22 00:36:11 -04:00
|
|
|
sock_addr.sin_port = htons(OPENSSL_EXAMPLE_TARGET_TCP_PORT);
|
2016-11-15 22:11:01 -05:00
|
|
|
ret = connect(socket, (struct sockaddr*)&sock_addr, sizeof(sock_addr));
|
|
|
|
if (ret) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed3;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "create SSL ......");
|
|
|
|
ssl = SSL_new(ctx);
|
|
|
|
if (!ssl) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed3;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
SSL_set_fd(ssl, socket);
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "SSL connected to %s port %d ......",
|
2017-03-22 00:36:11 -04:00
|
|
|
OPENSSL_EXAMPLE_TARGET_NAME, OPENSSL_EXAMPLE_TARGET_TCP_PORT);
|
2016-11-15 22:11:01 -05:00
|
|
|
ret = SSL_connect(ssl);
|
|
|
|
if (!ret) {
|
|
|
|
ESP_LOGI(TAG, "failed " );
|
|
|
|
goto failed4;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
ESP_LOGI(TAG, "send https request to %s port %d ......",
|
2017-03-22 00:36:11 -04:00
|
|
|
OPENSSL_EXAMPLE_TARGET_NAME, OPENSSL_EXAMPLE_TARGET_TCP_PORT);
|
2016-11-15 22:11:01 -05:00
|
|
|
ret = SSL_write(ssl, send_data, send_bytes);
|
|
|
|
if (ret <= 0) {
|
|
|
|
ESP_LOGI(TAG, "failed");
|
|
|
|
goto failed5;
|
|
|
|
}
|
|
|
|
ESP_LOGI(TAG, "OK");
|
|
|
|
|
|
|
|
do {
|
2017-03-22 00:36:11 -04:00
|
|
|
ret = SSL_read(ssl, recv_buf, OPENSSL_EXAMPLE_RECV_BUF_LEN - 1);
|
2016-11-15 22:11:01 -05:00
|
|
|
if (ret <= 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
recv_bytes += ret;
|
|
|
|
ESP_LOGI(TAG, "%s", recv_buf);
|
|
|
|
} while (1);
|
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
ESP_LOGI(TAG, "totaly read %d bytes data from %s ......", recv_bytes, OPENSSL_EXAMPLE_TARGET_NAME);
|
2016-11-15 22:11:01 -05:00
|
|
|
|
|
|
|
failed5:
|
|
|
|
SSL_shutdown(ssl);
|
|
|
|
failed4:
|
|
|
|
SSL_free(ssl);
|
|
|
|
ssl = NULL;
|
|
|
|
failed3:
|
|
|
|
close(socket);
|
|
|
|
socket = -1;
|
|
|
|
failed2:
|
|
|
|
SSL_CTX_free(ctx);
|
|
|
|
ctx = NULL;
|
|
|
|
failed1:
|
|
|
|
vTaskDelete(NULL);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
static void openssl_example_client_init(void)
|
2016-11-15 22:11:01 -05:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
xTaskHandle openssl_handle;
|
|
|
|
|
2017-03-22 00:36:11 -04:00
|
|
|
ret = xTaskCreate(openssl_example_task,
|
|
|
|
OPENSSL_EXAMPLE_TASK_NAME,
|
|
|
|
OPENSSL_EXAMPLE_TASK_STACK_WORDS,
|
2016-11-15 22:11:01 -05:00
|
|
|
NULL,
|
2017-03-22 00:36:11 -04:00
|
|
|
OPENSSL_EXAMPLE_TASK_PRORIOTY,
|
|
|
|
&openssl_handle);
|
2016-11-15 22:11:01 -05:00
|
|
|
|
|
|
|
if (ret != pdPASS) {
|
2017-03-22 00:36:11 -04:00
|
|
|
ESP_LOGI(TAG, "create thread %s failed", OPENSSL_EXAMPLE_TASK_NAME);
|
2016-11-15 22:11:01 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static esp_err_t wifi_event_handler(void *ctx, system_event_t *event)
|
|
|
|
{
|
|
|
|
switch(event->event_id) {
|
|
|
|
case SYSTEM_EVENT_STA_START:
|
|
|
|
esp_wifi_connect();
|
|
|
|
break;
|
|
|
|
case SYSTEM_EVENT_STA_GOT_IP:
|
|
|
|
xEventGroupSetBits(wifi_event_group, CONNECTED_BIT);
|
2017-03-22 00:36:11 -04:00
|
|
|
openssl_example_client_init();
|
2016-11-15 22:11:01 -05:00
|
|
|
break;
|
|
|
|
case SYSTEM_EVENT_STA_DISCONNECTED:
|
|
|
|
/* This is a workaround as ESP32 WiFi libs don't currently
|
|
|
|
auto-reassociate. */
|
|
|
|
esp_wifi_connect();
|
|
|
|
xEventGroupClearBits(wifi_event_group, CONNECTED_BIT);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void wifi_conn_init(void)
|
|
|
|
{
|
|
|
|
tcpip_adapter_init();
|
|
|
|
wifi_event_group = xEventGroupCreate();
|
|
|
|
ESP_ERROR_CHECK( esp_event_loop_init(wifi_event_handler, NULL) );
|
|
|
|
wifi_init_config_t cfg = WIFI_INIT_CONFIG_DEFAULT();
|
|
|
|
ESP_ERROR_CHECK( esp_wifi_init(&cfg) );
|
|
|
|
ESP_ERROR_CHECK( esp_wifi_set_storage(WIFI_STORAGE_RAM) );
|
|
|
|
wifi_config_t wifi_config = {
|
|
|
|
.sta = {
|
|
|
|
.ssid = EXAMPLE_WIFI_SSID,
|
|
|
|
.password = EXAMPLE_WIFI_PASS,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
ESP_ERROR_CHECK( esp_wifi_set_mode(WIFI_MODE_STA) );
|
2016-11-08 04:45:17 -05:00
|
|
|
ESP_ERROR_CHECK( esp_wifi_set_config(ESP_IF_WIFI_STA, &wifi_config) );
|
2016-11-15 22:11:01 -05:00
|
|
|
ESP_LOGI(TAG, "start the WIFI SSID:[%s] password:[%s]\n", EXAMPLE_WIFI_SSID, EXAMPLE_WIFI_PASS);
|
|
|
|
ESP_ERROR_CHECK( esp_wifi_start() );
|
|
|
|
}
|
|
|
|
|
|
|
|
void app_main(void)
|
|
|
|
{
|
2017-03-14 09:39:44 -04:00
|
|
|
ESP_ERROR_CHECK( nvs_flash_init() );
|
2016-11-15 22:11:01 -05:00
|
|
|
wifi_conn_init();
|
|
|
|
}
|