summaryrefslogtreecommitdiff
path: root/extra/yassl/examples/client/client.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'extra/yassl/examples/client/client.cpp')
-rw-r--r--extra/yassl/examples/client/client.cpp179
1 files changed, 0 insertions, 179 deletions
diff --git a/extra/yassl/examples/client/client.cpp b/extra/yassl/examples/client/client.cpp
deleted file mode 100644
index d2c07897f3c..00000000000
--- a/extra/yassl/examples/client/client.cpp
+++ /dev/null
@@ -1,179 +0,0 @@
-/*
- Copyright (c) 2006, 2012, Oracle and/or its affiliates. All rights reserved.
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; version 2 of the License.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program; see the file COPYING. If not, write to the
- Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston,
- MA 02110-1335 USA.
-*/
-
-/* client.cpp */
-
-// takes an optional command line argument of cipher list to make scripting
-// easier
-
-
-#include "../../testsuite/test.hpp"
-
-//#define TEST_RESUME
-
-
-void ClientError(SSL_CTX* ctx, SSL* ssl, SOCKET_T& sockfd, const char* msg)
-{
- SSL_CTX_free(ctx);
- SSL_free(ssl);
- tcp_close(sockfd);
- err_sys(msg);
-}
-
-
-#ifdef NON_BLOCKING
- void NonBlockingSSL_Connect(SSL* ssl, SSL_CTX* ctx, SOCKET_T& sockfd)
- {
- int ret = SSL_connect(ssl);
- int err = SSL_get_error(ssl, 0);
- while (ret != SSL_SUCCESS && (err == SSL_ERROR_WANT_READ ||
- err == SSL_ERROR_WANT_WRITE)) {
- if (err == SSL_ERROR_WANT_READ)
- printf("... client would read block\n");
- else
- printf("... client would write block\n");
- #ifdef _WIN32
- Sleep(1000);
- #else
- sleep(1);
- #endif
- ret = SSL_connect(ssl);
- err = SSL_get_error(ssl, 0);
- }
- if (ret != SSL_SUCCESS)
- ClientError(ctx, ssl, sockfd, "SSL_connect failed");
- }
-#endif
-
-
-void client_test(void* args)
-{
-#ifdef _WIN32
- WSADATA wsd;
- WSAStartup(0x0002, &wsd);
-#endif
-
- SOCKET_T sockfd = 0;
- int argc = 0;
- char** argv = 0;
-
- set_args(argc, argv, *static_cast<func_args*>(args));
- tcp_connect(sockfd);
-#ifdef NON_BLOCKING
- tcp_set_nonblocking(sockfd);
-#endif
- SSL_METHOD* method = TLSv1_client_method();
- SSL_CTX* ctx = SSL_CTX_new(method);
-
- set_certs(ctx);
- if (argc >= 2) {
- printf("setting cipher list to %s\n", argv[1]);
- if (SSL_CTX_set_cipher_list(ctx, argv[1]) != SSL_SUCCESS) {
- ClientError(ctx, NULL, sockfd, "set_cipher_list error\n");
- }
- }
- SSL* ssl = SSL_new(ctx);
-
- SSL_set_fd(ssl, sockfd);
-
-
-#ifdef NON_BLOCKING
- NonBlockingSSL_Connect(ssl, ctx, sockfd);
-#else
- // if you get an error here see note at top of README
- if (SSL_connect(ssl) != SSL_SUCCESS)
- ClientError(ctx, ssl, sockfd, "SSL_connect failed");
-#endif
- showPeer(ssl);
-
- const char* cipher = 0;
- int index = 0;
- char list[1024];
- strncpy(list, "cipherlist", 11);
- while ( (cipher = SSL_get_cipher_list(ssl, index++)) ) {
- strncat(list, ":", 2);
- strncat(list, cipher, strlen(cipher) + 1);
- }
- printf("%s\n", list);
- printf("Using Cipher Suite: %s\n", SSL_get_cipher(ssl));
-
- char msg[] = "hello yassl!";
- if (SSL_write(ssl, msg, sizeof(msg)) != sizeof(msg))
- ClientError(ctx, ssl, sockfd, "SSL_write failed");
-
- char reply[1024];
- int input = SSL_read(ssl, reply, sizeof(reply));
- if (input > 0) {
- reply[input] = 0;
- printf("Server response: %s\n", reply);
- }
-
-#ifdef TEST_RESUME
- SSL_SESSION* session = SSL_get_session(ssl);
- SSL* sslResume = SSL_new(ctx);
-#endif
-
- SSL_shutdown(ssl);
- SSL_free(ssl);
- tcp_close(sockfd);
-
-#ifdef TEST_RESUME
- tcp_connect(sockfd);
- SSL_set_fd(sslResume, sockfd);
- SSL_set_session(sslResume, session);
-
- if (SSL_connect(sslResume) != SSL_SUCCESS)
- ClientError(ctx, sslResume, sockfd, "SSL_resume failed");
- showPeer(sslResume);
-
- if (SSL_write(sslResume, msg, sizeof(msg)) != sizeof(msg))
- ClientError(ctx, sslResume, sockfd, "SSL_write failed");
-
- input = SSL_read(sslResume, reply, sizeof(reply));
- if (input > 0) {
- reply[input] = 0;
- printf("Server response: %s\n", reply);
- }
-
- SSL_shutdown(sslResume);
- SSL_free(sslResume);
- tcp_close(sockfd);
-#endif // TEST_RESUME
-
- SSL_CTX_free(ctx);
- ((func_args*)args)->return_code = 0;
-}
-
-
-#ifndef NO_MAIN_DRIVER
-
- int main(int argc, char** argv)
- {
- func_args args;
-
- args.argc = argc;
- args.argv = argv;
-
- client_test(&args);
- yaSSL_CleanUp();
-
- return args.return_code;
- }
-
-#endif // NO_MAIN_DRIVER
-