SPRACM5 April 2019 AM3351 , AM3351 , AM3352 , AM3352 , AM3354 , AM3354 , AM3356 , AM3356 , AM3357 , AM3357 , AM3358 , AM3358 , AM3359 , AM3359
Two cases were tested. Only the important logs were captured on the AM335 server role.
Case 1
AM335 Server Role _ AM335 Side(Partial part only):
tcpServerHandler_worker: start clientfd = 0x80096264
wolfSSL_read()
wolfSSL_read_internal()
ReceiveData()
Handshake not complete, trying to finish
wolfSSL_negotiate
SSL_accept()
my_IORecv: received
growing input buffer
my_IORecv: received
received record layer msg
DoHandShakeMsg()
DoHandShakeMsgType
processing client hello
Matched No Compression
Adding signature algorithms extension
Signature Algorithms extension received
MatchSuite
VerifyServerSuite
Requires RSA
Verified suite validity
accept state ACCEPT_FIRST_REPLY_DONE
growing output buffer
……….
BuildMessage
my_IOSend: sent
Shrinking output buffer
wolfSSL_read()
wolfSSL_read_internal()
ReceiveData()
my_IORecv: received
growing input buffer
my_IORecv: received
received record layer msg
got ALERT! ps. This one is correct, that means the NB (Client has no more data to send to AM335)
Got alert
close notify
AM335 Server Role : NB Side:
You can see the NB is running as Client.
E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>client -h 192.168.1.4 -p 2000
peer's cert info:
issuer : /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com
/emailAddress=info@wolfssl.com
subject: /C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Support/CN=www.wolfssl.com/ema
ilAddress=info@wolfssl.com
serial number:01
SSL version is TLSv1.2
SSL cipher suite is TLS_RSA_WITH_AES_256_CBC_SHA256
Client Random : B42BCE30A6B622E3D9EFE0A6455265F1E86447917CC441DECFB7A1243B84F9CB
wolfSSL's AM335 SK Series Connected Launchpad Heard you loud and clear!!!
E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>
Case 2
AM335 Client Role : AM335 Side(Partial part only). Only the important logs were captured on the AM335 side.
---------- ps: tcpClientHandler:wolfSSL_connect success ----------.
SSL_get_fd
SSL_write()
growing output buffer
BuildMessage
my_IOSend: sent
Shrinking output buffer
wolfSSL_read()
wolfSSL_read_internal()
ReceiveData()
my_IORecv: received
growing input buffer
my_IORecv: received
received record layer msg
got app DATA
Shrinking input buffer
---------- ps: tcpClientHandler:wolfSSL_Heard: "I hear you fa shizzle!" ----------.
SSL_free
CTX ref count not 0 yet, no free
---------- ps. tcpClientHandler:wolfSSL Memory_free ----------.
SSL_CTX_free
CTX ref count down to 0, doing full free
wolfSSL_CertManagerFree
wolfSSL_Cleanup
wolfCrypt_Cleanup
AM335 Client Role :NB Side:
E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>Server -b -p 1000
peer's cert info:
issuer : /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.w
olfssl.com/emailAddress=info@wolfssl.com
subject: /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.w
olfssl.com/emailAddress=info@wolfssl.com
serial number:b9:bc:90:ed:ad:aa:0a:8c
SSL version is TLSv1.2
SSL cipher suite is TLS_RSA_WITH_AES_256_CBC_SHA256
Server Random : 2368E8B669D5D3CA1706F90292914C8A072135D3DB7BE6DCB55003ADD597D550
Client message: Hello from TI AM335 SK EVM
E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>