SPRACM5 April   2019 AM3351 , AM3351 , AM3352 , AM3352 , AM3354 , AM3354 , AM3356 , AM3356 , AM3357 , AM3357 , AM3358 , AM3358 , AM3359 , AM3359

 

  1.   How to Port WOLFSSL Onto TI Sitara AM335 Starterkit
    1.     Trademarks
    2. Introduction
    3. Hardware and Software Required Stuffs
    4. Step-by-Step Porting
    5. Merging the WolfSSL Code and Building Regarding the NIMP FTP Example
    6. How to Verify?
    7. Testing environment
    8. Demo Movie
    9. Function API
    10. Test Pass Logs
    11. 10 References

Test Pass Logs

Two cases were tested. Only the important logs were captured on the AM335 server role.

  • Case1: AM335 is the server role, and NB is the client role
  • Case2: AM335 is the client role, and NB is the server role.

Case 1

AM335 Server Role _ AM335 Side(Partial part only): tcpServerHandler_worker: start clientfd = 0x80096264 wolfSSL_read() wolfSSL_read_internal() ReceiveData() Handshake not complete, trying to finish wolfSSL_negotiate SSL_accept() my_IORecv: received growing input buffer my_IORecv: received received record layer msg DoHandShakeMsg() DoHandShakeMsgType processing client hello Matched No Compression Adding signature algorithms extension Signature Algorithms extension received MatchSuite VerifyServerSuite Requires RSA Verified suite validity accept state ACCEPT_FIRST_REPLY_DONE growing output buffer ………. BuildMessage my_IOSend: sent Shrinking output buffer wolfSSL_read() wolfSSL_read_internal() ReceiveData() my_IORecv: received growing input buffer my_IORecv: received received record layer msg got ALERT! ps. This one is correct, that means the NB (Client has no more data to send to AM335) Got alert close notify

AM335 Server Role : NB Side:

You can see the NB is running as Client.

E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>client -h 192.168.1.4 -p 2000 peer's cert info: issuer : /C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com /emailAddress=info@wolfssl.com subject: /C=US/ST=Montana/L=Bozeman/O=wolfSSL/OU=Support/CN=www.wolfssl.com/ema ilAddress=info@wolfssl.com serial number:01 SSL version is TLSv1.2 SSL cipher suite is TLS_RSA_WITH_AES_256_CBC_SHA256 Client Random : B42BCE30A6B622E3D9EFE0A6455265F1E86447917CC441DECFB7A1243B84F9CB wolfSSL's AM335 SK Series Connected Launchpad Heard you loud and clear!!! E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>

Case 2

AM335 Client Role : AM335 Side(Partial part only). Only the important logs were captured on the AM335 side.

---------- ps: tcpClientHandler:wolfSSL_connect success ----------. SSL_get_fd SSL_write() growing output buffer BuildMessage my_IOSend: sent Shrinking output buffer wolfSSL_read() wolfSSL_read_internal() ReceiveData() my_IORecv: received growing input buffer my_IORecv: received received record layer msg got app DATA Shrinking input buffer ---------- ps: tcpClientHandler:wolfSSL_Heard: "I hear you fa shizzle!" ----------. SSL_free CTX ref count not 0 yet, no free ---------- ps. tcpClientHandler:wolfSSL Memory_free ----------. SSL_CTX_free CTX ref count down to 0, doing full free wolfSSL_CertManagerFree wolfSSL_Cleanup wolfCrypt_Cleanup

AM335 Client Role :NB Side:

E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>Server -b -p 1000 peer's cert info: issuer : /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.w olfssl.com/emailAddress=info@wolfssl.com subject: /C=US/ST=Montana/L=Bozeman/O=wolfSSL_2048/OU=Programming-2048/CN=www.w olfssl.com/emailAddress=info@wolfssl.com serial number:b9:bc:90:ed:ad:aa:0a:8c SSL version is TLSv1.2 SSL cipher suite is TLS_RSA_WITH_AES_256_CBC_SHA256 Server Random : 2368E8B669D5D3CA1706F90292914C8A072135D3DB7BE6DCB55003ADD597D550 Client message: Hello from TI AM335 SK EVM E:\TLS_Wolf_64_Bit\wolfssl-master\Debug>