Skip to main content


Eclipse Community Forums
Forum Search:

Search      Help    Register    Login    Home
Home » Eclipse Projects » Eclipse Titan » Using the TLS_Handler part 2
Using the TLS_Handler part 2 [message #1767353] Wed, 05 July 2017 06:03
Elemer Lelik is currently offline Elemer LelikFriend
Messages: 853
Registered: January 2015
Senior Member
Dear all,

As promised, we will continue with moving from inter-component communication over the kernel IP stack by connecting the two components over UDP:




                          +--------------------------+           +--------------------------+
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |     objA(client)         |           |     objB(server)         |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |     MTC                  |           |                          |
                          |                          |           |   PTC                    |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          +--------------------------+           +------^-------------------+
                                                | 127.0.0.1:6006        | 127.0.0.1:4004
                                                |                       |
                                                |                       |
                               +----------------v--------------------------------------+
                               |                                                       |
                               |                                                       |
                               |                    UDP                                |
                               |                                                       |
                               |                                                       |
                               |                                                       |
                               +-------------------------------------------------------+





module proba {

import from TLS_Handler all;
import from UDPasp_Types    all;
import from UDPasp_PortType all;


type port inPT message
{
  in  octetstring
  out octetstring
} with {extension "internal"}

type component CT{

  var octetstring inputstream:=''O
  var octetstring outputstream:=''O
  var TLS_op_result res
  var octetstring recv;
  var integer objA;
  var ASP_UDP_message v_ASP_UDP_message;

  port UDPasp_PT p;
  timer T0;

}

type component parCT {

  var octetstring instream:=''O
  var octetstring outstream:=''O
  var TLS_op_result res
  var octetstring recv;
  var integer objB
  var ASP_UDP_message v_ASP_UDP_message

  port UDPasp_PT p;

} 

template ASP_UDP_message t_ASP_UPD_Message_toClient(in template octetstring p_data) := {
  data		:=	p_data ,
  remote_addr	:=	"127.0.0.1",
  remote_port	:=	6006,
  id      	:=	0
}

template ASP_UDP_message t_ASP_UPD_Message_toServer(in template octetstring p_data) := {
  data		:=	p_data ,
  remote_addr	:=	"127.0.0.1",
  remote_port	:=	4004,
  id      	:=	0
}

template ASP_UDP_open listenRequest := {
  remote_addr :=	"127.0.0.1",
  remote_port :=	6006,
  local_addr  := 	"127.0.0.1",
  local_port  := 	4004
}

template ASP_UDP_open openRequest := {
  remote_addr :=	"127.0.0.1",
  remote_port :=	4004,
  local_addr  := 	"127.0.0.1",
  local_port  := 	6006
}

function f_ParBehaviour()  runs on parCT
{
  map(self:p, system:p);

  p.send(listenRequest) ;
  p.receive(ASP_UDP_open_result:?)

  var TLS_descriptor descr2:={
    TLS_method_DTLS,
    omit,
    omit,
    "privatekey_2.pem",
    "certificate_2.pem",
    "trusted_certs.pem",
    "ALL",
    "passwd",
    true
  }

  res:=TLS_New_object(descr2,objB)
  log(res)
  log(objB)

  res:=TLS_Handshake(objB,true,instream,outstream)  // B is server


  log("Result of first handshake B :", res) // B is server
  log("instream  :",instream)
  log("outstream   :",outstream )

  while(res!=TLS_OK and res!=TLS_ERROR) {

    log("next round")
    log("-------------------------------------")

    if(res==TLS_DATA_TO_SEND) {
      p.send(t_ASP_UPD_Message_toClient(outstream))
      res:=TLS_Handshake(objB,true,instream,outstream)  // B is server
      log("Result of subsequent handshake B :", res) // B is server
      log("instream  :",instream)
      log("outstream   :",outstream )
    }
    else if (res==TLS_NEED_MORE_DATA)
    {
      if (lengthof(outstream) >0)
      {
        p.send(t_ASP_UPD_Message_toClient(outstream))
      }


      p.receive(ASP_UDP_message:?) -> value v_ASP_UDP_message { instream:= v_ASP_UDP_message.data}


      res:=TLS_Handshake(objB,true,instream,outstream)  // B is server

      log("Result of subsequent handshake B :", res) // B is server
      log("instream  :",instream)
      log("outstream   :",outstream )
    }
  
  }//endwhile


  p.receive(ASP_UDP_message:?) -> value v_ASP_UDP_message { instream:= v_ASP_UDP_message.data}

  res:=TLS_Read(objB,recv,instream,outstream)
  log("Result of read  :",res)
  log("received data  :", recv)
  log("instream  :",instream)
  log("outstream   :",outstream )

}//endfunction



testcase TC1() runs on CT {

  var parCT v_parCT := parCT.create;  

  v_parCT.start(f_ParBehaviour())

  map(self:p, system:p)

  p.send(openRequest) ;
  p.receive(ASP_UDP_open_result:?)

  var TLS_descriptor descr:={
    TLS_method_DTLS,
    omit,
    omit,
    "privatekey.pem",
    "certificate.pem",
    "trusted_certs.pem",
    "ALL",
    "passwd",
    false//true
  }


  res:=TLS_New_object(descr,objA)
  log(res)
  log(objA)

  res:=TLS_Handshake(objA,false,inputstream,outputstream)
  log("Result of subsequent handshake A :", res) // A is client
  log("inputstream  :",inputstream)
  log("outputstream   :",outputstream )

  while(res!=TLS_OK and res!=TLS_ERROR) {

    if(res==TLS_NEED_MORE_DATA )
    {

      if (lengthof(outputstream)>0  )
      {
        p.send(t_ASP_UPD_Message_toServer(outputstream))
      }

      p.receive(ASP_UDP_message:?) -> value v_ASP_UDP_message { inputstream:= v_ASP_UDP_message.data}

      res:=TLS_Handshake(objA,false,inputstream,outputstream)
      log("Result of subsequent handshake A :", res) // A is client
      log("inputstream  :",inputstream)
      log("outputstream   :",outputstream )
    }

    else  if(res==TLS_DATA_TO_SEND) {

      p.send(t_ASP_UPD_Message_toServer(outputstream))

      res:=TLS_Handshake(objA,false,inputstream,outputstream)
      log("Result of subsequent handshake A :", res) // A is client
      log("inputstream  :",inputstream)
      log("outputstream   :",outputstream )
    }

  } //endwhile


  //wait for the handshake to finish
  T0.start(0.1); T0.timeout;

  res:=TLS_Write(objA,char2oct("Bow to your Titan overlords!"),inputstream,outputstream)
  log("Result of write  :",res)
  log("inputstream  :",inputstream)
  log("outputstream   :",outputstream )


  if (lengthof(outputstream)>0  )
  {
    p.send(t_ASP_UPD_Message_toServer(outputstream))
  }

  T0.start(0.1); T0.timeout;
}

control{
  execute(TC1())
}


}							   
					


The shortened MTC log:

11:45:17.174670 - TTCN-3 Main Test Component started on esekilxxen1844. Version: CRL 113 200/6 R2A.
11:45:17.174872 - TTCN Logger v2.2 options: TimeStampFormat:=Time; LogEntityName:=No; LogEventTypes:=No; SourceInfoFormat:=Single; *.FileMask:=LOG_ALL | MATCHING | DEBUG; *.ConsoleMask:=ERROR | TESTCASE | PORTEVENT | STATISTICS | WARNING; LogFileSize:=0; LogFileNumber:=1; DiskFullAction:=Error
11:45:17.174963 - Connected to MC.
11:45:17.183366 - Executing control part of module proba.
11:45:17.183411 proba.ttcn:291 Execution of control part in module proba started.
11:45:17.183470 proba.ttcn:186 Test case TC1 started.
11:45:17.183519 proba.ttcn:186 Initializing variables, timers and ports of component type proba.CT inside testcase TC1.
11:45:17.183649 proba.ttcn:186 Port p was started.
:
:
11:45:17.222058 proba.ttcn:249 outputstream   :''O
11:45:17.222125 proba.ttcn:269 Start timer T0: 0.1 s
11:45:17.323220 proba.ttcn:269 Timeout T0: 0.1 s
11:45:17.323328 proba.ttcn:275 Result of write  :TLS_OK (0)
11:45:17.323352 proba.ttcn:276 inputstream  :'14FEFF000000000000000400010116FEFF00010000000000000050156D0F30AD6069C25FD0D3F4C2363E09CA6A05A7B9E847FBAE7F1989C1F7B21E6A6CDAB56B7C08AD616BF6D369B79E33D023DB2E7724AB422E297CB0816201F755B10E74D600B7EBA74C673322E84130'O
11:45:17.323476 proba.ttcn:277 outputstream   :'17FEFF00010000000000010050EF186700125514BAC17BD96530355C46BD0C2BD673D9238829AD3A400D98546E075576ED66CCC11070E62E45D6417BA7FCD94713DAE4C2B489B7ED0AF5776CAB375F1337D1C68AD3318D6D57B551120D'O
11:45:17.323584 proba.ttcn:282 Sent on p to system @UDPasp_Types.ASP_UDP_message : { data := '17FEFF00010000000000010050EF186700125514BAC17BD96530355C46BD0C2BD673D9238829AD3A400D98546E075576ED66CCC11070E62E45D6417BA7FCD94713DAE4C2B489B7ED0AF5776CAB375F1337D1C68AD3318D6D57B551120D'O, remote_addr := "127.0.0.1", remote_port := 4004, id := 0 }
11:45:17.323648 proba.ttcn:285 Start timer T0: 0.1 s
11:45:17.423674 proba.ttcn:285 Timeout T0: 0.1 s
11:45:17.423732 proba.ttcn:285 Terminating component type proba.CT.
11:45:17.423749 proba.ttcn:285 Removing unterminated mapping between port p and system:p.
11:45:17.423799 proba.ttcn:285 Port p was unmapped from system:p.
11:45:17.423821 proba.ttcn:285 Port p was stopped.
11:45:17.423837 proba.ttcn:285 Component type proba.CT was shut down inside testcase TC1.
11:45:17.423850 proba.ttcn:285 Waiting for PTCs to finish.
11:45:17.424023 proba.ttcn:285 Setting final verdict of the test case.
11:45:17.424062 proba.ttcn:285 Local verdict of MTC: none
11:45:17.424082 proba.ttcn:285 Local verdict of PTC with component reference 3: none (none -> none)
11:45:17.424097 proba.ttcn:285 Test case TC1 finished. Verdict: none
11:45:17.424120 proba.ttcn:292 Execution of control part in module proba finished.
11:45:17.431382 - Verdict statistics: 1 none (100.00 %), 0 pass (0.00 %), 0 inconc (0.00 %), 0 fail (0.00 %), 0 error (0.00 %).
11:45:17.431447 - Test execution summary: 1 test case was executed. Overall verdict: none
11:45:17.431463 - Exit was requested from MC. Terminating MTC.


The shortened Comp #3 (PTC) log:

11:45:17.191049 - TTCN-3 Parallel Test Component started on esekilxxen1844. Component reference: 3, component type: proba.parCT. Version: CRL 113 200/6 R2A.
11:45:17.191179 - TTCN Logger v2.2 options: TimeStampFormat:=Time; LogEntityName:=No; LogEventTypes:=No; SourceInfoFormat:=Single; *.FileMask:=LOG_ALL | MATCHING | DEBUG; *.ConsoleMask:=ERROR | TESTCASE | PORTEVENT | STATISTICS | WARNING; LogFileSize:=0; LogFileNumber:=1; DiskFullAction:=Error
11:45:17.191297 - Connected to MC.
11:45:17.191341 - Initializing variables, timers and ports of component type proba.parCT inside testcase TC1.
11:45:17.191461 - Port p was started.
11:45:17.191505 - Component type proba.parCT was initialized.
11:45:17.191557 - Starting function f_ParBehaviour().
11:45:17.191584 proba.ttcn:105 Mapping port 3:p to system:p.
11:45:17.191670 proba.ttcn:105 Port p was mapped to system:p.
11:45:17.191767 proba.ttcn:105 Map operation of 3:p to system:p finished.
11:45:17.191862 proba.ttcn:107 Sent on p to system @UDPasp_Types.ASP_UDP_open : { remote_addr := "127.0.0.1", remote_port := 6006, local_addr := "127.0.0.1", local_port := 4004 }
11:45:17.191942 proba.ttcn:107 Warning: The maximum number of open file descriptors (8193) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "p")
11:45:17.192013 proba.ttcn:107 Message enqueued on p from system @UDPasp_Types.ASP_UDP_open_result : { local_addr := "127.0.0.1", local_port := 4004, id := 0 } id 1
11:45:17.192067 proba.ttcn:108 Matching on port p succeeded:  matched
11:45:17.192095 proba.ttcn:108 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_open_result : { local_addr := "127.0.0.1", local_port := 4004, id := 0 } id 1
11:45:17.192123 proba.ttcn:108 Message with id 1 was extracted from the queue of p.
11:45:17.202327 proba.ttcn:127 TLS_OK (0)
11:45:17.202369 proba.ttcn:128 0
11:45:17.202461 proba.ttcn:133 Result of first handshake B :TLS_NEED_MORE_DATA (1)
11:45:17.202478 proba.ttcn:134 instream  :''O
11:45:17.202496 proba.ttcn:135 outstream   :''O
11:45:17.202507 proba.ttcn:139 next round
11:45:17.202515 proba.ttcn:140 -------------------------------------
:
:
11:45:17.222905 proba.ttcn:147 outstream   :''O
11:45:17.323721 proba.ttcn:173 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '17FEFF00010000000000010050EF186700125514BAC17BD96530355C46BD0C2BD673D9238829AD3A400D98546E075576ED66CCC11070E62E45D6417BA7FCD94713DAE4C2B489B7ED0AF5776CAB375F1337D1C68AD3318D6D57B551120D'O, remote_addr := "127.0.0.1", remote_port := 6006, id := 0 } id 4
11:45:17.323781 proba.ttcn:173 Matching on port p succeeded:  matched
11:45:17.323811 proba.ttcn:173 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '17FEFF00010000000000010050EF186700125514BAC17BD96530355C46BD0C2BD673D9238829AD3A400D98546E075576ED66CCC11070E62E45D6417BA7FCD94713DAE4C2B489B7ED0AF5776CAB375F1337D1C68AD3318D6D57B551120D'O, remote_addr := "127.0.0.1", remote_port := 6006, id := 0 } id 4
11:45:17.323848 proba.ttcn:173 Message with id 4 was extracted from the queue of p.
11:45:17.323915 proba.ttcn:176 Result of read  :TLS_OK (0)
11:45:17.323939 proba.ttcn:177 received data  :'426F7720746F20796F757220546974616E206F7665726C6F72647321'O ("Bow to your Titan overlords!")
11:45:17.323999 proba.ttcn:178 instream  :'17FEFF00010000000000010050EF186700125514BAC17BD96530355C46BD0C2BD673D9238829AD3A400D98546E075576ED66CCC11070E62E45D6417BA7FCD94713DAE4C2B489B7ED0AF5776CAB375F1337D1C68AD3318D6D57B551120D'O
11:45:17.324091 proba.ttcn:179 outstream   :''O
11:45:17.324112 - Function f_ParBehaviour finished. PTC terminates.
11:45:17.324128 - Terminating component type proba.parCT.
11:45:17.324145 - Removing unterminated mapping between port p and system:p.
11:45:17.324194 - Port p was unmapped from system:p.
11:45:17.324230 - Port p was stopped.
11:45:17.324260 - Component type proba.parCT was shut down inside testcase TC1.
11:45:17.324290 - Final verdict of PTC: none
11:45:17.324405 - Disconnected from MC.
11:45:17.324428 - TTCN-3 Parallel Test Component finished.



Obviously, these logs are not much different from the logs collected in the previous scenario.







Finally, we remove the parallel component and replace it with a DTLS server simulated with openSSL:



                          +--------------------------+           +--------------------------+
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |     objA(client)         |           |     openssl server       |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |     MTC                  |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          |                          |           |                          |
                          +--------------------------+           +------^-------------------+
                                                | 127.0.0.1:6006        | 127.0.0.1:44330
                                                |                       |
                                                |                       |
                               +----------------v--------------------------------------+
                               |                                                       |
                               |                                                       |
                               |                    UDP                                |
                               |                                                       |
                               |                                                       |
                               |                                                       |
                               +-------------------------------------------------------+




To start the server, we first generate server certificates:

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes


When done, we should start the server with:

( echo "No I will not" ; sleep 10 ) | openssl s_server -key key.pem -cert cert.pem -accept 44330 -dtls1 


with the effect that when the server receives something it will reply with the given string then shut down.


The TTCN-3 code of the client:

module proba {

import from TLS_Handler all;
import from UDPasp_Types    all;
import from UDPasp_PortType all;

type port inPT message
{
  in  octetstring
  out octetstring
} with {extension "internal"}

type component CT{

  var octetstring inputstream:=''O
  var octetstring outputstream:=''O
  var TLS_op_result res
  var octetstring recv;
  var integer objA;
  var ASP_UDP_message v_ASP_UDP_message;

  port UDPasp_PT p;
}



template ASP_UDP_message t_ASP_UPD_Message_toServer(in template octetstring p_data) := {
  data		:=	p_data ,
  remote_addr	:=	"127.0.0.1",
  remote_port	:=	44330,
  id      	:=	0
}


template ASP_UDP_open openRequest := {
  remote_addr :=	"127.0.0.1",
  remote_port :=	44330,
  local_addr  := 	"127.0.0.1",
  local_port  := 	6006
}



testcase TC1() runs on CT {


  map(self:p, system:p)

  p.send(openRequest) ;
  p.receive(ASP_UDP_open_result:?)

  var TLS_descriptor descr:={
    TLS_method_DTLS,
    omit,
    omit,
    "privatekey.pem",
    "certificate.pem",
    "trusted_certs.pem",
    "ALL",
    "passwd",
    false//true
  }

  res:=TLS_New_object(descr,objA)
  log(res)
  log(objA)

  res:=TLS_Handshake(objA,false,inputstream,outputstream)
  log("Result of first handshake A :", res) // A is client
  log("inputstream  :",inputstream)
  log("outputstream   :",outputstream )

  while(res!=TLS_OK and res!=TLS_ERROR) {

    if(res==TLS_NEED_MORE_DATA )
    {

      if (lengthof(outputstream)>0  )
      {
        p.send(t_ASP_UPD_Message_toServer(outputstream))
      }
      p.receive(ASP_UDP_message:?) -> value v_ASP_UDP_message { inputstream:= v_ASP_UDP_message.data}

      res:=TLS_Handshake(objA,false,inputstream,outputstream)
      log("Result of subsequent handshake A :", res) // A is client
      log("inputstream  :",inputstream)
      log("outputstream   :",outputstream )
    }

    else  if(res==TLS_DATA_TO_SEND) {

      p.send(t_ASP_UPD_Message_toServer(outputstream))

      res:=TLS_Handshake(objA,false,inputstream,outputstream)
      log("Result of subsequent handshake A :", res) // A is client
      log("inputstream  :",inputstream)
      log("outputstream   :",outputstream )

    }

  } //endwhile



  res:=TLS_Write(objA,char2oct("Bow to your Titan overlords!"),inputstream,outputstream)
  log("Result of write  :",res)
  log("inputstream  :",inputstream)
  log("outputstream   :",outputstream )


  if (lengthof(outputstream)>0  )
  {
    p.send(t_ASP_UPD_Message_toServer(outputstream))
  }

  p.receive(ASP_UDP_message:?) -> value v_ASP_UDP_message { inputstream:= v_ASP_UDP_message.data}

  res:=TLS_Read(objA,recv,inputstream,outputstream)
  log("Result of read  :",res)
  log("received data  :", recv)
  log("instream  :",inputstream)
  log("outstream   :",outputstream )

}

control{
  execute(TC1())
}


}



and the MTC log(no other component in this scenario):

11:51:53.719057 - TTCN-3 Main Test Component started on esekilxxen1844. Version: CRL 113 200/6 R2A.
11:51:53.719250 - TTCN Logger v2.2 options: TimeStampFormat:=Time; LogEntityName:=No; LogEventTypes:=No; SourceInfoFormat:=Single; *.FileMask:=LOG_ALL | DEBUG; *.ConsoleMask:=ERROR | TESTCASE | PORTEVENT | STATISTICS | WARNING; LogFileSize:=0; LogFileNumber:=1; DiskFullAction:=Error
11:51:53.719365 - Connected to MC.
11:51:53.726542 - Executing control part of module proba.
11:51:53.726605 proba.ttcn:153 Execution of control part in module proba started.
11:51:53.726676 proba.ttcn:55 Test case TC1 started.
11:51:53.726735 proba.ttcn:55 Initializing variables, timers and ports of component type proba.CT inside testcase TC1.
11:51:53.726860 proba.ttcn:55 Port p was started.
11:51:53.726910 proba.ttcn:55 Component type proba.CT was initialized.
11:51:53.726939 proba.ttcn:58 Mapping port mtc:p to system:p.
11:51:53.727025 proba.ttcn:58 Port p was mapped to system:p.
11:51:53.727114 proba.ttcn:58 Map operation of mtc:p to system:p finished.
11:51:53.727214 proba.ttcn:60 Sent on p to system @UDPasp_Types.ASP_UDP_open : { remote_addr := "127.0.0.1", remote_port := 44330, local_addr := "127.0.0.1", local_port := 6006 }
11:51:53.727312 proba.ttcn:60 Warning: The maximum number of open file descriptors (8193) is greater than FD_SETSIZE (1024). Ensure that Test Ports using Install_Handler do not try to wait for events of file descriptors with values greater than FD_SETSIZE (1024). (Current caller of Install_Handler is "p")
11:51:53.727383 proba.ttcn:60 Message enqueued on p from system @UDPasp_Types.ASP_UDP_open_result : { local_addr := "127.0.0.1", local_port := 6006, id := 0 } id 1
11:51:53.727452 proba.ttcn:61 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_open_result : { local_addr := "127.0.0.1", local_port := 6006, id := 0 } id 1
11:51:53.727500 proba.ttcn:61 Message with id 1 was extracted from the queue of p.
11:51:53.737106 proba.ttcn:81 TLS_OK (0)
11:51:53.737181 proba.ttcn:82 0
11:51:53.737320 proba.ttcn:86 Result of first handshake A :TLS_DATA_TO_SEND (2)
11:51:53.737337 proba.ttcn:87 inputstream  :''O
11:51:53.737352 proba.ttcn:88 outputstream   :'16FEFF000000000000000000770100006B000000000000006BFEFF593E64394D354DF4927FC47E99C67ACA64557F1B7156114E32EDCAAA327204750000003C00890088008700840046004500440041003A003900380035003400330032002F001B001A0019001600150014001300120011000A00090008000600FF020100000400230000'O
11:51:53.737491 proba.ttcn:113 Sent on p to system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000000000000000000770100006B000000000000006BFEFF593E64394D354DF4927FC47E99C67ACA64557F1B7156114E32EDCAAA327204750000003C00890088008700840046004500440041003A003900380035003400330032002F001B001A0019001600150014001300120011000A00090008000600FF020100000400230000'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 }
11:51:53.737780 proba.ttcn:116 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.737800 proba.ttcn:117 inputstream  :''O
11:51:53.737811 proba.ttcn:118 outputstream   :''O
11:51:53.737864 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF0000000000000000000F030000030000000000000003FEFF00'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 2
11:51:53.737935 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '16FEFF0000000000000000000F030000030000000000000003FEFF00'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 2
11:51:53.737979 proba.ttcn:103 Message with id 2 was extracted from the queue of p.
11:51:53.738047 proba.ttcn:106 Result of subsequent handshake A :TLS_DATA_TO_SEND (2)
11:51:53.738072 proba.ttcn:107 inputstream  :'16FEFF0000000000000000000F030000030000000000000003FEFF00'O
11:51:53.738124 proba.ttcn:108 outputstream   :'16FEFF000000000000000100770100006B000100000000006BFEFF593E64394D354DF4927FC47E99C67ACA64557F1B7156114E32EDCAAA327204750000003C00890088008700840046004500440041003A003900380035003400330032002F001B001A0019001600150014001300120011000A00090008000600FF020100000400230000'O
11:51:53.738295 proba.ttcn:113 Sent on p to system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000000000000000100770100006B000100000000006BFEFF593E64394D354DF4927FC47E99C67ACA64557F1B7156114E32EDCAAA327204750000003C00890088008700840046004500440041003A003900380035003400330032002F001B001A0019001600150014001300120011000A00090008000600FF020100000400230000'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 }
11:51:53.738975 proba.ttcn:116 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.739032 proba.ttcn:117 inputstream  :'16FEFF0000000000000000000F030000030000000000000003FEFF00'O
11:51:53.739090 proba.ttcn:118 outputstream   :''O
11:51:53.739152 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000000000000000100590200004D000100000000004DFEFF593E64391E8C572F586FC38825F0FFEE17E6CB24C2157DD539D688F50000000020A4B07330896B167F8AB9698DC8C333FDB95AA8FDD3D7C3841021AECB54FE90050088010005FF01000100'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 3
11:51:53.739223 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000000000000000100590200004D000100000000004DFEFF593E64391E8C572F586FC38825F0FFEE17E6CB24C2157DD539D688F50000000020A4B07330896B167F8AB9698DC8C333FDB95AA8FDD3D7C3841021AECB54FE90050088010005FF01000100'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 3
11:51:53.739272 proba.ttcn:103 Message with id 3 was extracted from the queue of p.
11:51:53.739353 proba.ttcn:106 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.739379 proba.ttcn:107 inputstream  :'16FEFF000000000000000100590200004D000100000000004DFEFF593E64391E8C572F586FC38825F0FFEE17E6CB24C2157DD539D688F50000000020A4B07330896B167F8AB9698DC8C333FDB95AA8FDD3D7C3841021AECB54FE90050088010005FF01000100'O
11:51:53.739507 proba.ttcn:108 outputstream   :''O
11:51:53.739613 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000000000000000204550B00044900020000000004490004460004433082043F30820327A003020102020900E61E105F3B1497BC300D06092A864886F70D01010505003072310B3009060355040613024855310C300A06035504081303425544310C300A06035504071303425544310C300A060355040A1303457269310F300D060355040313066574686C656C3128302606092A864886F70D0109011619656C656D65722E6C656C696B406572696373736F6E2E636F6D301E170D3137303630393037313432315A170D3138303630393037313432315A3072310B3009060355040613024855310C300A06035504081303425544310C300A06035504071303425544310C300A060355040A1303457269310F300D060355040313066574686C656C3128302606092A864886F70D0109011619656C656D65722E6C656C696B406572696373736F6E2E636F6D30820122300D06092A864886F70D01010105000382010F003082010A0282010100BA6B52CD66782EE9F9A9DAEBF0083128D355672A5B2E05CF9A87EFC1DE58DD570F1DF7B1B9C185B538004AC62789A03616E7234A9072FA2D4E9495255DE96ED85FAE8512985772E3CBA189146386A396AD6FC26795055A0D416E1345A47A37C5C759F6ED5047A3364FB676041747F8556B48246A975DADDBD358E637B6152C7635C9CEBB5DF66860F58441F3CA6E06165425E79BFF0B1305E4E0243CDE9F5CEAB20EE766540A6923A9F946878D347BE4DAF03309FE096ACE77B0D4B567C523D144E79667E80579B4B72442917E8CC546DBE451C9926800BDE9746B6AF5C061D9426613F57A19D058795913E994989BAB9D099F87000B16716EBCC22D44E5C89D0203010001A381D73081D4301D0603551D0E041604148BFAA90E9D14B10BC030725777EDFFBA99ABFC463081A40603551D2304819C30819980148BFAA90E9D14B10BC030725777EDFFBA99ABFC46A176A4743072310B3009060355040613024855310C300A06035504081303425544310C300A06035504071303425544310C300A060355040A1303457269310F300D060355040313066574686C656C3128302606092A864886F70D0109011619656C656D65722E6C656C696B406572696373736F6E2E636F6D820900E61E105F3B1497BC300C0603551D13040530030101FF300D06092A864886F70D010105050003820101003DF5B9F9A48A50EC698D91D2341EB8EA50DE7A2696B2C75A84011A216BAC89B367E511283A05CEFA696BB6EE007CC7E21E8B50B23CC60BE5033C9725B7397F579BB1EE1205CE5114278CC89589FEA08F665149E5CA7775AD7162AB31B3F444396D5902B053736F5F6C63C04E17DB886701B15C81B814D858DB572B3FCD8C945F14B20EA50970FD55E569CA2F2D8A36E5F558246147C47742B2D3C863C97E7D00AE0B2DBCBE7FA0FE35AED1E22BDE0E0D361A496CDD7E6CF15DBAD76F638CDCF8011F61A90002F2BB9801A9D103DECB7C0C93EB9D5AD4E9A60B4227E0DD98A48FA113A0DB66C03F6AB4D31DF8BE715929FA17F29EB8DC1E9B3363EC7644A2C015'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 4
11:51:53.739770 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data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remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 4
11:51:53.739847 proba.ttcn:103 Message with id 4 was extracted from the queue of p.
11:51:53.740066 proba.ttcn:106 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.740093 proba.ttcn:107 inputstream  :'16FEFF000000000000000204550B00044900020000000004490004460004433082043F30820327A003020102020900E61E105F3B1497BC300D06092A864886F70D01010505003072310B3009060355040613024855310C300A06035504081303425544310C300A06035504071303425544310C300A060355040A1303457269310F300D060355040313066574686C656C3128302606092A864886F70D0109011619656C656D65722E6C656C696B406572696373736F6E2E636F6D301E170D3137303630393037313432315A170D3138303630393037313432315A3072310B3009060355040613024855310C300A06035504081303425544310C300A06035504071303425544310C300A060355040A1303457269310F300D060355040313066574686C656C3128302606092A864886F70D0109011619656C656D65722E6C656C696B406572696373736F6E2E636F6D30820122300D06092A864886F70D01010105000382010F003082010A0282010100BA6B52CD66782EE9F9A9DAEBF0083128D355672A5B2E05CF9A87EFC1DE58DD570F1DF7B1B9C185B538004AC62789A03616E7234A9072FA2D4E9495255DE96ED85FAE8512985772E3CBA189146386A396AD6FC26795055A0D416E1345A47A37C5C759F6ED5047A3364FB676041747F8556B48246A975DADDBD358E637B6152C7635C9CEBB5DF66860F58441F3CA6E06165425E79BFF0B1305E4E0243CDE9F5CEAB20EE766540A6923A9F946878D347BE4DAF03309FE096ACE77B0D4B567C523D144E79667E80579B4B72442917E8CC546DBE451C9926800BDE9746B6AF5C061D9426613F57A19D058795913E994989BAB9D099F87000B16716EBCC22D44E5C89D0203010001A381D73081D4301D0603551D0E041604148BFAA90E9D14B10BC030725777EDFFBA99ABFC463081A40603551D2304819C30819980148BFAA90E9D14B10BC030725777EDFFBA99ABFC46A176A4743072310B3009060355040613024855310C300A06035504081303425544310C300A06035504071303425544310C300A060355040A1303457269310F300D060355040313066574686C656C3128302606092A864886F70D0109011619656C656D65722E6C656C696B406572696373736F6E2E636F6D820900E61E105F3B1497BC300C0603551D13040530030101FF300D06092A864886F70D010105050003820101003DF5B9F9A48A50EC698D91D2341EB8EA50DE7A2696B2C75A84011A216BAC89B367E511283A05CEFA696BB6EE007CC7E21E8B50B23CC60BE5033C9725B7397F579BB1EE1205CE5114278CC89589FEA08F665149E5CA7775AD7162AB31B3F444396D5902B053736F5F6C63C04E17DB886701B15C81B814D858DB572B3FCD8C945F14B20EA50970FD55E569CA2F2D8A36E5F558246147C47742B2D3C863C97E7D00AE0B2DBCBE7FA0FE35AED1E22BDE0E0D361A496CDD7E6CF15DBAD76F638CDCF8011F61A90002F2BB9801A9D103DECB7C0C93EB9D5AD4E9A60B4227E0DD98A48FA113A0DB66C03F6AB4D31DF8BE715929FA17F29EB8DC1E9B3363EC7644A2C015'O
11:51:53.741494 proba.ttcn:108 outputstream   :''O
11:51:53.748793 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data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remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 5
11:51:53.748897 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data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remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 5
11:51:53.748978 proba.ttcn:103 Message with id 5 was extracted from the queue of p.
11:51:53.749214 proba.ttcn:106 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.749234 proba.ttcn:107 inputstream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
11:51:53.749520 proba.ttcn:108 outputstream   :''O
11:51:53.749547 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF0000000000000004000C0E0000000004000000000000'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 6
11:51:53.749615 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '16FEFF0000000000000004000C0E0000000004000000000000'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 6
11:51:53.749659 proba.ttcn:103 Message with id 6 was extracted from the queue of p.
11:51:53.750745 proba.ttcn:106 Result of subsequent handshake A :TLS_DATA_TO_SEND (2)
11:51:53.750766 proba.ttcn:107 inputstream  :'16FEFF0000000000000004000C0E0000000004000000000000'O
11:51:53.750796 proba.ttcn:108 outputstream   :'16FEFF0000000000000002004E10000042000200000000004200409590274AE8CC53C4DC11E0730C68F287DADAC3745297FD15009B8EF322035F2F54934DF3439088AAB4AF0E62B6A34E29C0EA8DC865EE36EA1A626F500CB350D914FEFF000000000000000300010116FEFF000100000000000000507084C40171EABBE4103DA2598C21942408355A36A656DE9B1AF5D50D942D6249370DF8CAC25092FB5FC9F6F38AB7BB980E82B46C7984DB6437A927F605FD4DD2865C8961A3F782C5B23E9627B98DED4E'O
11:51:53.750974 proba.ttcn:113 Sent on p to system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF0000000000000002004E10000042000200000000004200409590274AE8CC53C4DC11E0730C68F287DADAC3745297FD15009B8EF322035F2F54934DF3439088AAB4AF0E62B6A34E29C0EA8DC865EE36EA1A626F500CB350D914FEFF000000000000000300010116FEFF000100000000000000507084C40171EABBE4103DA2598C21942408355A36A656DE9B1AF5D50D942D6249370DF8CAC25092FB5FC9F6F38AB7BB980E82B46C7984DB6437A927F605FD4DD2865C8961A3F782C5B23E9627B98DED4E'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 }
11:51:53.752576 proba.ttcn:116 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.752612 proba.ttcn:117 inputstream  :'16FEFF0000000000000004000C0E0000000004000000000000'O
11:51:53.752644 proba.ttcn:118 outputstream   :''O
11:51:53.752678 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '14FEFF0000000000000005000101'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 7
11:51:53.752717 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '14FEFF0000000000000005000101'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 7
11:51:53.752751 proba.ttcn:103 Message with id 7 was extracted from the queue of p.
11:51:53.753037 proba.ttcn:106 Result of subsequent handshake A :TLS_NEED_MORE_DATA (1)
11:51:53.753056 proba.ttcn:107 inputstream  :'14FEFF0000000000000005000101'O
11:51:53.753081 proba.ttcn:108 outputstream   :''O
11:51:53.753110 proba.ttcn:103 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000100000000000000506407DA8FAB57B92527142646ACCC61E122D0658DA93BAA290185A957AE0DFBEB7671BB72163C65804B899E97EC14131A4CC3213A5C3E55601F8312A6A47A7EDC17C1F33D4F90D25162BD9B140FD11604'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 8
11:51:53.753148 proba.ttcn:103 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '16FEFF000100000000000000506407DA8FAB57B92527142646ACCC61E122D0658DA93BAA290185A957AE0DFBEB7671BB72163C65804B899E97EC14131A4CC3213A5C3E55601F8312A6A47A7EDC17C1F33D4F90D25162BD9B140FD11604'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 8
11:51:53.753171 proba.ttcn:103 Message with id 8 was extracted from the queue of p.
11:51:53.753263 proba.ttcn:106 Result of subsequent handshake A :TLS_OK (0)
11:51:53.753280 proba.ttcn:107 inputstream  :'16FEFF000100000000000000506407DA8FAB57B92527142646ACCC61E122D0658DA93BAA290185A957AE0DFBEB7671BB72163C65804B899E97EC14131A4CC3213A5C3E55601F8312A6A47A7EDC17C1F33D4F90D25162BD9B140FD11604'O
11:51:53.753367 proba.ttcn:108 outputstream   :''O
11:51:53.754077 proba.ttcn:128 Result of write  :TLS_OK (0)
11:51:53.754099 proba.ttcn:129 inputstream  :'16FEFF000100000000000000506407DA8FAB57B92527142646ACCC61E122D0658DA93BAA290185A957AE0DFBEB7671BB72163C65804B899E97EC14131A4CC3213A5C3E55601F8312A6A47A7EDC17C1F33D4F90D25162BD9B140FD11604'O
11:51:53.754175 proba.ttcn:130 outputstream   :'17FEFF00010000000000010050C426FB68E1683E2F0726B0280BA192BC6F7F9273A02A44067BC54F8F747845F6CCB88D842048F47760D5DE13E3C3593B51A80D2A2108A6AEFCBA8A00B1B6ECE187D51A6D7BFA6836D35AE34AA7A02535'O
11:51:53.754251 proba.ttcn:135 Sent on p to system @UDPasp_Types.ASP_UDP_message : { data := '17FEFF00010000000000010050C426FB68E1683E2F0726B0280BA192BC6F7F9273A02A44067BC54F8F747845F6CCB88D842048F47760D5DE13E3C3593B51A80D2A2108A6AEFCBA8A00B1B6ECE187D51A6D7BFA6836D35AE34AA7A02535'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 }
11:51:53.754328 proba.ttcn:141 Message enqueued on p from system @UDPasp_Types.ASP_UDP_message : { data := '17FEFF00010000000000010040C86BB602BB5D321BCA16A9E543880D23FBB8CC062FB321D5832FCF95D28A0F953D4B6DA2E03D02D328EE88EB16EFE329B70BE912137B8062ADD5E499A143F944'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 9
11:51:53.754391 proba.ttcn:141 Receive operation on port p succeeded, message from system(): @UDPasp_Types.ASP_UDP_message : { data := '17FEFF00010000000000010040C86BB602BB5D321BCA16A9E543880D23FBB8CC062FB321D5832FCF95D28A0F953D4B6DA2E03D02D328EE88EB16EFE329B70BE912137B8062ADD5E499A143F944'O, remote_addr := "127.0.0.1", remote_port := 44330, id := 0 } id 9
11:51:53.754419 proba.ttcn:141 Message with id 9 was extracted from the queue of p.
11:51:53.754461 proba.ttcn:144 Result of read  :TLS_OK (0)
11:51:53.754477 proba.ttcn:145 received data  :'4E6F20492077696C6C206E6F740A'O ("No I will not\n")
11:51:53.754512 proba.ttcn:146 instream  :'17FEFF00010000000000010040C86BB602BB5D321BCA16A9E543880D23FBB8CC062FB321D5832FCF95D28A0F953D4B6DA2E03D02D328EE88EB16EFE329B70BE912137B8062ADD5E499A143F944'O
11:51:53.754580 proba.ttcn:147 outstream   :''O
11:51:53.754592 proba.ttcn:147 Terminating component type proba.CT.
11:51:53.754607 proba.ttcn:147 Removing unterminated mapping between port p and system:p.
11:51:53.754650 proba.ttcn:147 Port p was unmapped from system:p.
11:51:53.754681 proba.ttcn:147 Port p was stopped.
11:51:53.754707 proba.ttcn:147 Component type proba.CT was shut down inside testcase TC1.
11:51:53.754722 proba.ttcn:147 Waiting for PTCs to finish.
11:51:53.754799 proba.ttcn:147 Setting final verdict of the test case.
11:51:53.754830 proba.ttcn:147 Local verdict of MTC: none
11:51:53.754855 proba.ttcn:147 No PTCs were created.
11:51:53.754867 proba.ttcn:147 Test case TC1 finished. Verdict: none
11:51:53.754891 proba.ttcn:154 Execution of control part in module proba finished.
11:51:53.762697 - Verdict statistics: 1 none (100.00 %), 0 pass (0.00 %), 0 inconc (0.00 %), 0 fail (0.00 %), 0 error (0.00 %).
11:51:53.762773 - Test execution summary: 1 test case was executed. Overall verdict: none
11:51:53.762789 - Exit was requested from MC. Terminating MTC.



and the printout on the server side:

( echo "No I will not" ; sleep 10 ) | openssl s_server -key key.pem -cert cert.pem -accept 44330 -dtls1
Using default temp DH parameters
Using default temp ECDH parameters
ACCEPT
Bow to your Titan overlords!DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   1 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)



Thus, we managed to establish an encrypted communication over the legacy UDP port which itself does not have DTLS support.QED.




I hope this may prove useful.
The code is attached as usual.


Best regards

Elemer

[Updated on: Wed, 05 July 2017 06:29]

Report message to a moderator

Previous Topic:IoT-Testware project
Next Topic:[Solved] Titan Json Decoder bug with enum and int
Goto Forum:
  


Current Time: Thu Nov 15 00:52:19 GMT 2018

Powered by FUDForum. Page generated in 0.01764 seconds
.:: Contact :: Home ::.

Powered by: FUDforum 3.0.2.
Copyright ©2001-2010 FUDforum Bulletin Board Software

Back to the top