37#if COAP_WITH_LIBMBEDTLS
53#include <mbedtls/version.h>
56#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
57#define MBEDTLS_2_X_COMPAT
60#ifndef MBEDTLS_ALLOW_PRIVATE_ACCESS
61#define MBEDTLS_ALLOW_PRIVATE_ACCESS
65#include <mbedtls/platform.h>
66#include <mbedtls/net_sockets.h>
67#include <mbedtls/ssl.h>
68#include <mbedtls/version.h>
71#if MBEDTLS_VERSION_NUMBER >= 0x04000000
72#define COAP_USE_PSA_CRYPTO 1
74#define COAP_USE_PSA_CRYPTO 0
77#if COAP_USE_PSA_CRYPTO
78#include <psa/crypto.h>
80#include <mbedtls/entropy.h>
81#include <mbedtls/ctr_drbg.h>
82#include <mbedtls/sha256.h>
83#include <mbedtls/md.h>
84#include <mbedtls/cipher.h>
86#include <mbedtls/error.h>
87#include <mbedtls/timing.h>
88#include <mbedtls/ssl_cookie.h>
89#include <mbedtls/oid.h>
90#include <mbedtls/debug.h>
91#if defined(ESPIDF_VERSION) && defined(CONFIG_MBEDTLS_DEBUG)
92#include <mbedtls/esp_debug.h>
94#if !COAP_USE_PSA_CRYPTO && defined(MBEDTLS_PSA_CRYPTO_C)
95#include <psa/crypto.h>
101#if COAP_USE_PSA_CRYPTO
102typedef psa_hash_operation_t coap_crypto_sha256_ctx_t;
103typedef psa_algorithm_t coap_crypto_md_type_t;
105#define COAP_CRYPTO_MD_SHA1 PSA_ALG_SHA_1
106#define COAP_CRYPTO_MD_SHA256 PSA_ALG_SHA_256
107#define COAP_CRYPTO_MD_SHA384 PSA_ALG_SHA_384
108#define COAP_CRYPTO_MD_SHA512 PSA_ALG_SHA_512
109#define COAP_CRYPTO_MD_NONE PSA_ALG_NONE
112typedef mbedtls_sha256_context coap_crypto_sha256_ctx_t;
113typedef mbedtls_md_type_t coap_crypto_md_type_t;
115#define COAP_CRYPTO_MD_SHA1 MBEDTLS_MD_SHA1
116#define COAP_CRYPTO_MD_SHA256 MBEDTLS_MD_SHA256
117#define COAP_CRYPTO_MD_SHA384 MBEDTLS_MD_SHA384
118#define COAP_CRYPTO_MD_SHA512 MBEDTLS_MD_SHA512
119#define COAP_CRYPTO_MD_NONE MBEDTLS_MD_NONE
129#ifndef mbedtls_malloc
130#define mbedtls_malloc(a) malloc(a)
132#ifndef mbedtls_realloc
133#define mbedtls_realloc(a, b) realloc((a), (b))
136#define mbedtls_free(a) free(a)
140coap_mbedtls_strdup_alloc(
const char *s) {
148 copy = (
char *)mbedtls_malloc(len);
150 memcpy(copy, s, len);
156coap_mbedtls_strndup_alloc(
const char *s,
size_t n) {
164 copy = (
char *)mbedtls_malloc(len + 1);
166 memcpy(copy, s, len);
172#ifndef mbedtls_strdup
173#define mbedtls_strdup(a) coap_mbedtls_strdup_alloc(a)
175#ifndef mbedtls_strndup
176#define mbedtls_strndup(a, b) coap_mbedtls_strndup_alloc((a), (b))
179#ifndef MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED
181#ifdef MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
182#define MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED
186#if ! COAP_SERVER_SUPPORT
187#undef MBEDTLS_SSL_SRV_C
189#if ! COAP_CLIENT_SUPPORT
190#undef MBEDTLS_SSL_CLI_C
194#define strcasecmp _stricmp
197#define IS_PSK (1 << 0)
198#define IS_PKI (1 << 1)
199#define IS_CLIENT (1 << 6)
200#define IS_SERVER (1 << 7)
202typedef struct coap_ssl_t {
213typedef struct coap_mbedtls_env_t {
214 mbedtls_ssl_context ssl;
215#if !COAP_USE_PSA_CRYPTO
216 mbedtls_entropy_context entropy;
217 mbedtls_ctr_drbg_context ctr_drbg;
219 mbedtls_ssl_config conf;
220 mbedtls_timing_delay_context timer;
221 mbedtls_x509_crt cacert;
222 mbedtls_x509_crt public_cert;
223 mbedtls_pk_context private_key;
224 mbedtls_ssl_cookie_ctx cookie_ctx;
228 int seen_client_hello;
231 unsigned int retry_scalar;
232 coap_ssl_t coap_ssl_data;
233 uint32_t server_hello_cnt;
236typedef struct pki_sni_entry {
239 mbedtls_x509_crt cacert;
240 mbedtls_x509_crt public_cert;
241 mbedtls_pk_context private_key;
244typedef struct psk_sni_entry {
249typedef struct coap_mbedtls_context_t {
251 size_t pki_sni_count;
252 pki_sni_entry *pki_sni_entry_list;
253 size_t psk_sni_count;
254 psk_sni_entry *psk_sni_entry_list;
257 int trust_store_defined;
259} coap_mbedtls_context_t;
261typedef enum coap_enc_method_t {
273} zephyr_timing_delay_context;
276zephyr_timing_set_delay(
void *data, uint32_t int_ms, uint32_t fin_ms) {
277 zephyr_timing_delay_context *ctx = (zephyr_timing_delay_context *)data;
283 ctx->start_time = k_uptime_get_32();
286 ctx->int_time = ctx->start_time + int_ms;
287 ctx->fin_time = ctx->start_time + fin_ms;
295zephyr_timing_get_delay(
void *data) {
296 zephyr_timing_delay_context *ctx = (zephyr_timing_delay_context *)data;
299 if (ctx ==
NULL || ctx->fin_time == 0) {
303 now = k_uptime_get_32();
305 if (now >= ctx->fin_time) {
309 if (now >= ctx->int_time) {
323#if COAP_SERVER_SUPPORT
327coap_crypto_sha256_init(coap_crypto_sha256_ctx_t *ctx) {
328#if COAP_USE_PSA_CRYPTO
329 *ctx = psa_hash_operation_init();
330 return (psa_hash_setup(ctx, PSA_ALG_SHA_256) == PSA_SUCCESS) ? 0 : -1;
332 mbedtls_sha256_init(ctx);
333#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
334 return mbedtls_sha256_starts_ret(ctx, 0);
336 return mbedtls_sha256_starts(ctx, 0);
342coap_crypto_sha256_update(coap_crypto_sha256_ctx_t *ctx,
343 const uint8_t *data,
size_t len) {
344#if COAP_USE_PSA_CRYPTO
345 return (psa_hash_update(ctx, data, len) == PSA_SUCCESS) ? 0 : -1;
347#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
348 return mbedtls_sha256_update_ret(ctx, data, len);
350 return mbedtls_sha256_update(ctx, data, len);
356coap_crypto_sha256_finish(coap_crypto_sha256_ctx_t *ctx, uint8_t *output) {
357#if COAP_USE_PSA_CRYPTO
359 return (psa_hash_finish(ctx, output, 32, &hash_len) == PSA_SUCCESS) ? 0 : -1;
361#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
362 return mbedtls_sha256_finish_ret(ctx, output);
364 return mbedtls_sha256_finish(ctx, output);
370coap_crypto_sha256_free(coap_crypto_sha256_ctx_t *ctx) {
371#if COAP_USE_PSA_CRYPTO
374 mbedtls_sha256_free(ctx);
382coap_crypto_hash_size(coap_crypto_md_type_t md_type) {
383#if COAP_USE_PSA_CRYPTO
384 switch ((
int)md_type) {
387 case PSA_ALG_SHA_256:
389 case PSA_ALG_SHA_384:
391 case PSA_ALG_SHA_512:
397 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_type);
398 return md_info ? mbedtls_md_get_size(md_info) : 0;
403coap_crypto_hash_compute(coap_crypto_md_type_t md_type,
404 const uint8_t *input,
size_t ilen,
405 uint8_t *output,
size_t output_size,
406 size_t *output_len) {
407#if COAP_USE_PSA_CRYPTO
409 psa_status_t status = psa_hash_compute(md_type, input, ilen,
410 output, output_size, &actual_len);
412 *output_len = actual_len;
413 return (status == PSA_SUCCESS) ? 0 : -1;
415 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_type);
418 size_t hash_len = mbedtls_md_get_size(md_info);
419 if (hash_len > output_size)
422 *output_len = hash_len;
423 return mbedtls_md(md_info, input, ilen, output);
430#if COAP_OSCORE_SUPPORT
432coap_crypto_hmac_compute(coap_crypto_md_type_t md_type,
433 const uint8_t *key,
size_t key_len,
434 const uint8_t *input,
size_t ilen,
435 uint8_t *output,
size_t output_size,
436 size_t *output_len) {
437#if COAP_USE_PSA_CRYPTO
438 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
440 psa_algorithm_t psa_alg = PSA_ALG_HMAC(md_type);
444 psa_set_key_type(&attributes, PSA_KEY_TYPE_HMAC);
445 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_MESSAGE);
446 psa_set_key_algorithm(&attributes, psa_alg);
448 if (psa_import_key(&attributes, key, key_len, &key_id) != PSA_SUCCESS) {
452 status = psa_mac_compute(key_id, psa_alg, input, ilen,
453 output, output_size, &mac_len);
454 psa_destroy_key(key_id);
457 *output_len = mac_len;
458 return (status == PSA_SUCCESS) ? 0 : -1;
460 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_type);
463 size_t mac_size = mbedtls_md_get_size(md_info);
464 if (mac_size > output_size)
467 *output_len = mac_size;
468 return mbedtls_md_hmac(md_info, key, key_len, input, ilen, output);
475coap_crypto_aead_encrypt_ccm(
const uint8_t *key,
size_t key_len,
476 const uint8_t *nonce,
size_t nonce_len,
477 const uint8_t *aad,
size_t aad_len,
478 const uint8_t *plaintext,
size_t plaintext_len,
479 uint8_t *ciphertext,
size_t ciphertext_size,
480 size_t *ciphertext_len,
size_t tag_len) {
481#if COAP_USE_PSA_CRYPTO
482 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
484 psa_algorithm_t psa_alg = PSA_ALG_AEAD_WITH_SHORTENED_TAG(PSA_ALG_CCM, tag_len);
488 psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
489 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_ENCRYPT);
490 psa_set_key_algorithm(&attributes, psa_alg);
491 psa_set_key_bits(&attributes, key_len * 8);
493 if (psa_import_key(&attributes, key, key_len, &key_id) != PSA_SUCCESS) {
497 status = psa_aead_encrypt(key_id, psa_alg,
500 plaintext, plaintext_len,
501 ciphertext, ciphertext_size, &output_len);
502 psa_destroy_key(key_id);
505 *ciphertext_len = output_len;
506 return (status == PSA_SUCCESS) ? 0 : -1;
508 mbedtls_cipher_context_t ctx;
509 const mbedtls_cipher_info_t *cipher_info;
510 mbedtls_cipher_type_t cipher_type;
512 size_t result_len = ciphertext_size;
515 cipher_type = MBEDTLS_CIPHER_AES_128_CCM;
516 }
else if (key_len == 32) {
517 cipher_type = MBEDTLS_CIPHER_AES_256_CCM;
522 cipher_info = mbedtls_cipher_info_from_type(cipher_type);
526 mbedtls_cipher_init(&ctx);
527 if (mbedtls_cipher_setup(&ctx, cipher_info) != 0)
529 if (mbedtls_cipher_setkey(&ctx, key, key_len * 8, MBEDTLS_ENCRYPT) != 0)
532#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
534 unsigned char tag[16];
535 if (mbedtls_cipher_auth_encrypt(&ctx,
538 plaintext, plaintext_len,
539 ciphertext, &result_len,
540 tag, tag_len) != 0) {
543 if ((result_len + tag_len) > ciphertext_size)
545 memcpy(ciphertext + result_len, tag, tag_len);
546 result_len += tag_len;
549 if (mbedtls_cipher_auth_encrypt_ext(&ctx,
552 plaintext, plaintext_len,
553 ciphertext, ciphertext_size,
554 &result_len, tag_len) != 0) {
560 *ciphertext_len = result_len;
564 mbedtls_cipher_free(&ctx);
570coap_crypto_aead_decrypt_ccm(
const uint8_t *key,
size_t key_len,
571 const uint8_t *nonce,
size_t nonce_len,
572 const uint8_t *aad,
size_t aad_len,
573 const uint8_t *ciphertext,
size_t ciphertext_len,
574 uint8_t *plaintext,
size_t plaintext_size,
575 size_t *plaintext_len,
size_t tag_len) {
576#if COAP_USE_PSA_CRYPTO
577 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
579 psa_algorithm_t psa_alg = PSA_ALG_AEAD_WITH_SHORTENED_TAG(PSA_ALG_CCM, tag_len);
583 psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
584 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DECRYPT);
585 psa_set_key_algorithm(&attributes, psa_alg);
586 psa_set_key_bits(&attributes, key_len * 8);
588 if (psa_import_key(&attributes, key, key_len, &key_id) != PSA_SUCCESS) {
592 status = psa_aead_decrypt(key_id, psa_alg,
595 ciphertext, ciphertext_len,
596 plaintext, plaintext_size, &output_len);
597 psa_destroy_key(key_id);
600 *plaintext_len = output_len;
601 return (status == PSA_SUCCESS) ? 0 : -1;
603 mbedtls_cipher_context_t ctx;
604 const mbedtls_cipher_info_t *cipher_info;
605 mbedtls_cipher_type_t cipher_type;
607 size_t result_len = plaintext_size;
610 cipher_type = MBEDTLS_CIPHER_AES_128_CCM;
611 }
else if (key_len == 32) {
612 cipher_type = MBEDTLS_CIPHER_AES_256_CCM;
617 cipher_info = mbedtls_cipher_info_from_type(cipher_type);
621 mbedtls_cipher_init(&ctx);
622 if (mbedtls_cipher_setup(&ctx, cipher_info) != 0)
624 if (mbedtls_cipher_setkey(&ctx, key, key_len * 8, MBEDTLS_DECRYPT) != 0)
627#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
629 const unsigned char *tag = ciphertext + ciphertext_len - tag_len;
630 if (mbedtls_cipher_auth_decrypt(&ctx,
633 ciphertext, ciphertext_len - tag_len,
634 plaintext, &result_len,
635 tag, tag_len) != 0) {
640 if (mbedtls_cipher_auth_decrypt_ext(&ctx,
643 ciphertext, ciphertext_len,
644 plaintext, plaintext_size,
645 &result_len, tag_len) != 0) {
651 *plaintext_len = result_len;
655 mbedtls_cipher_free(&ctx);
663#if !COAP_USE_PSA_CRYPTO
664#ifndef MBEDTLS_2_X_COMPAT
669coap_rng(
void *ctx
COAP_UNUSED,
unsigned char *buf,
size_t len) {
670 return coap_prng_lkd(buf, len) ? 0 : MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED;
676coap_dgram_read(
void *ctx,
unsigned char *out,
size_t outl) {
681 if (!c_session->
tls) {
683 return MBEDTLS_ERR_SSL_WANT_READ;
685 data = &((coap_mbedtls_env_t *)c_session->
tls)->coap_ssl_data;
688 if (data->pdu_len > 0) {
689 if (outl < data->pdu_len) {
690 memcpy(out, data->pdu, outl);
693 data->pdu_len -= outl;
695 memcpy(out, data->pdu, data->pdu_len);
697 if (!data->peekmode) {
703 ret = MBEDTLS_ERR_SSL_WANT_READ;
717coap_dgram_write(
void *ctx,
const unsigned char *send_buffer,
718 size_t send_buffer_length) {
723 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
727 && c_session->endpoint ==
NULL
735 send_buffer, send_buffer_length);
736 if (result != (ssize_t)send_buffer_length) {
737 int keep_errno = errno;
740 result, send_buffer_length);
743 if (errno == ENOTCONN || errno == ECONNREFUSED)
752 m_env->last_timeout = now;
760#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) && defined(MBEDTLS_SSL_SRV_C)
765psk_server_callback(
void *p_info, mbedtls_ssl_context *ssl,
766 const unsigned char *identity,
size_t identity_len) {
769 coap_mbedtls_env_t *m_env;
773 if (c_session ==
NULL)
777 lidentity.
s = identity ? (
const uint8_t *)identity : (const uint8_t *)
"";
778 lidentity.
length = identity ? identity_len : 0;
782 (
int)lidentity.
length, (
const char *)lidentity.
s);
784 m_env = (coap_mbedtls_env_t *)c_session->
tls;
785 setup_data = &c_session->
context->spsk_setup_data;
799 mbedtls_ssl_set_hs_psk(ssl, psk_key->
s, psk_key->
length);
800 m_env->seen_client_hello = 1;
806get_san_or_cn_from_cert(mbedtls_x509_crt *crt) {
808 const mbedtls_asn1_named_data *cn_data;
810 if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) {
811 mbedtls_asn1_sequence *seq = &crt->subject_alt_names;
812 while (seq && seq->buf.p ==
NULL) {
817 return mbedtls_strndup((
const char *)seq->buf.p,
822 cn_data = mbedtls_asn1_find_named_data(&crt->subject,
824 MBEDTLS_OID_SIZE(MBEDTLS_OID_AT_CN));
827 return mbedtls_strndup((
const char *)cn_data->val.p,
834#if COAP_MAX_LOGGING_LEVEL > 0
836get_error_string(
int ret) {
837 static char buf[128] = {0};
838 mbedtls_strerror(ret, buf,
sizeof(buf)-1);
844self_signed_cert_verify_callback_mbedtls(
void *data,
849 const coap_mbedtls_context_t *m_context =
853 if (*flags & MBEDTLS_X509_BADCERT_EXPIRED) {
855 *flags &= ~MBEDTLS_X509_BADCERT_EXPIRED;
866cert_verify_callback_mbedtls(
void *data, mbedtls_x509_crt *crt,
867 int depth, uint32_t *flags) {
869 coap_mbedtls_context_t *m_context =
877 cn = get_san_or_cn_from_cert(crt);
879 if (*flags & MBEDTLS_X509_BADCERT_EXPIRED) {
881 *flags &= ~MBEDTLS_X509_BADCERT_EXPIRED;
884 "The certificate has expired", cn ? cn :
"?", depth);
887 if (*flags & MBEDTLS_X509_BADCERT_FUTURE) {
889 *flags &= ~MBEDTLS_X509_BADCERT_FUTURE;
892 "The certificate has a future date", cn ? cn :
"?", depth);
895 if (*flags & MBEDTLS_X509_BADCERT_BAD_MD) {
897 *flags &= ~MBEDTLS_X509_BADCERT_BAD_MD;
900 "The certificate has a bad MD hash", cn ? cn :
"?", depth);
903 if (*flags & MBEDTLS_X509_BADCERT_BAD_KEY) {
905 *flags &= ~MBEDTLS_X509_BADCERT_BAD_KEY;
908 "The certificate has a short RSA length", cn ? cn :
"?", depth);
911 if (*flags & MBEDTLS_X509_BADCERT_NOT_TRUSTED) {
913 int self_signed = !mbedtls_x509_crt_verify(crt, crt,
NULL,
NULL, &lflags,
914 self_signed_cert_verify_callback_mbedtls,
916 if (self_signed && depth == 0) {
919 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
923 cn ? cn :
"?", depth);
925 }
else if (self_signed) {
927 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
930 "Self-signed", cn ? cn :
"?", depth);
934 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
937 "The certificate's CA is not trusted", cn ? cn :
"?", depth);
941 if (*flags & MBEDTLS_X509_BADCRL_EXPIRED) {
943 *flags &= ~MBEDTLS_X509_BADCRL_EXPIRED;
946 "The certificate's CRL has expired", cn ? cn :
"?", depth);
948 *flags &= ~MBEDTLS_X509_BADCRL_EXPIRED;
951 if (*flags & MBEDTLS_X509_BADCRL_FUTURE) {
953 *flags &= ~MBEDTLS_X509_BADCRL_FUTURE;
956 "The certificate's CRL has a future date", cn ? cn :
"?", depth);
958 *flags &= ~MBEDTLS_X509_BADCRL_FUTURE;
963 *flags |= MBEDTLS_X509_BADCERT_OTHER;
966 "The certificate's verify depth is too long",
967 cn ? cn :
"?", depth);
970 if (*flags & MBEDTLS_X509_BADCERT_CN_MISMATCH) {
971 *flags &= ~MBEDTLS_X509_BADCERT_CN_MISMATCH;
985 *flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH;
991 int ret = mbedtls_x509_crt_verify_info(buf,
sizeof(buf),
"", *flags);
994 tcp = strchr(buf,
'\n');
999 buf, *flags, cn ? cn :
"?", depth);
1000 tcp = strchr(tcp+1,
'\n');
1003 coap_log_err(
"mbedtls_x509_crt_verify_info returned -0x%x: '%s'\n",
1004 -ret, get_error_string(ret));
1015setup_pki_credentials(mbedtls_x509_crt *cacert,
1016 mbedtls_x509_crt *public_cert,
1017 mbedtls_pk_context *private_key,
1018 coap_mbedtls_env_t *m_env,
1019 coap_mbedtls_context_t *m_context,
1025 int done_private_key = 0;
1026 int done_public_cert = 0;
1044#if defined(MBEDTLS_FS_IO)
1045 mbedtls_pk_init(private_key);
1046#if COAP_USE_PSA_CRYPTO
1047 ret = mbedtls_pk_parse_keyfile(private_key,
1049#elif defined(MBEDTLS_2_X_COMPAT)
1050 ret = mbedtls_pk_parse_keyfile(private_key,
1053 ret = mbedtls_pk_parse_keyfile(private_key,
1055 NULL, coap_rng, (
void *)&m_env->ctr_drbg);
1062 done_private_key = 1;
1070 mbedtls_pk_init(private_key);
1074 buffer = mbedtls_malloc(length + 1);
1080 buffer[length] =
'\000';
1082#if COAP_USE_PSA_CRYPTO
1083 ret = mbedtls_pk_parse_key(private_key, buffer, length,
NULL, 0);
1084#elif defined(MBEDTLS_2_X_COMPAT)
1085 ret = mbedtls_pk_parse_key(private_key, buffer, length,
NULL, 0);
1087 ret = mbedtls_pk_parse_key(private_key, buffer, length,
1088 NULL, 0, coap_rng, (
void *)&m_env->ctr_drbg);
1090 mbedtls_free(buffer);
1092#if COAP_USE_PSA_CRYPTO
1093 ret = mbedtls_pk_parse_key(private_key,
1096#elif defined(MBEDTLS_2_X_COMPAT)
1097 ret = mbedtls_pk_parse_key(private_key,
1101 ret = mbedtls_pk_parse_key(private_key,
1104 NULL, 0, coap_rng, (
void *)&m_env->ctr_drbg);
1112 done_private_key = 1;
1115 mbedtls_pk_init(private_key);
1116#if COAP_USE_PSA_CRYPTO
1117 ret = mbedtls_pk_parse_key(private_key,
1120#elif defined(MBEDTLS_2_X_COMPAT)
1121 ret = mbedtls_pk_parse_key(private_key,
1125 ret = mbedtls_pk_parse_key(private_key,
1128 (
void *)&m_env->ctr_drbg);
1135 done_private_key = 1;
1163#if defined(MBEDTLS_FS_IO)
1164 mbedtls_x509_crt_init(public_cert);
1165 ret = mbedtls_x509_crt_parse_file(public_cert,
1172 done_public_cert = 1;
1180 mbedtls_x509_crt_init(public_cert);
1185 buffer = mbedtls_malloc(length + 1);
1191 buffer[length] =
'\000';
1193 ret = mbedtls_x509_crt_parse(public_cert, buffer, length);
1194 mbedtls_free(buffer);
1196 ret = mbedtls_x509_crt_parse(public_cert,
1205 done_public_cert = 1;
1212 mbedtls_x509_crt_init(public_cert);
1213 ret = mbedtls_x509_crt_parse(public_cert,
1221 done_public_cert = 1;
1239 if (done_private_key && done_public_cert) {
1240 ret = mbedtls_ssl_conf_own_cert(&m_env->conf, public_cert, private_key);
1242 coap_log_err(
"mbedtls_ssl_conf_own_cert returned -0x%x: '%s'\n",
1243 -ret, get_error_string(ret));
1258#if defined(MBEDTLS_FS_IO)
1259 mbedtls_x509_crt_init(cacert);
1260 ret = mbedtls_x509_crt_parse_file(cacert,
1267 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1275 mbedtls_x509_crt_init(cacert);
1279 buffer = mbedtls_malloc(length + 1);
1285 buffer[length] =
'\000';
1287 ret = mbedtls_x509_crt_parse(cacert, buffer, length);
1288 mbedtls_free(buffer);
1290 ret = mbedtls_x509_crt_parse(cacert,
1299 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1306 mbedtls_x509_crt_init(cacert);
1307 ret = mbedtls_x509_crt_parse(cacert,
1315 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1329#if defined(MBEDTLS_FS_IO)
1330 if (m_context->root_ca_file) {
1331 ret = mbedtls_x509_crt_parse_file(cacert, m_context->root_ca_file);
1338 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1340 if (m_context->root_ca_path) {
1341 ret = mbedtls_x509_crt_parse_path(cacert, m_context->root_ca_path);
1348 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1350#if MBEDTLS_VERSION_NUMBER >= 0x04000000
1351 if (m_context->trust_store_defined)
1353 if (m_context->trust_store_defined ||
1358 const char *trust_list[] = {
1359 "/etc/ssl/ca-bundle.pem",
1360 "/etc/ssl/certs/ca-certificates.crt",
1361 "/etc/pki/tls/cert.pem",
1362 "/usr/local/share/certs/ca-root-nss.crt",
1365 static const char *trust_file_found =
NULL;
1366 static int trust_file_done = 0;
1369 if (trust_file_found) {
1370 ret = mbedtls_x509_crt_parse_file(cacert, trust_file_found);
1372 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1377 }
else if (!trust_file_done) {
1378 trust_file_done = 1;
1379 for (i = 0; i <
sizeof(trust_list)/
sizeof(trust_list[0]); i++) {
1380 ret = mbedtls_x509_crt_parse_file(cacert, trust_list[i]);
1382 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert,
NULL);
1383 trust_file_found = trust_list[i];
1387 if (i ==
sizeof(trust_list)/
sizeof(trust_list[0])) {
1393 if (m_context->root_ca_file || m_context->root_ca_path ||
1394 m_context->trust_store_defined) {
1402#if defined(MBEDTLS_SSL_SRV_C)
1403 mbedtls_ssl_conf_cert_req_ca_list(&m_env->conf,
1405 MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED :
1406 MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED);
1409 MBEDTLS_SSL_VERIFY_REQUIRED :
1410 MBEDTLS_SSL_VERIFY_NONE);
1415 mbedtls_ssl_conf_verify(&m_env->conf,
1416 cert_verify_callback_mbedtls, c_session);
1421#if defined(MBEDTLS_SSL_SRV_C)
1426pki_sni_callback(
void *p_info, mbedtls_ssl_context *ssl,
1427 const unsigned char *uname,
size_t name_len) {
1431 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
1432 coap_mbedtls_context_t *m_context =
1436 name = mbedtls_malloc(name_len+1);
1440 memcpy(name, uname, name_len);
1441 name[name_len] =
'\000';
1444 for (i = 0; i < m_context->pki_sni_count; i++) {
1445 if (strcasecmp(name, m_context->pki_sni_entry_list[i].sni) == 0) {
1449 if (i == m_context->pki_sni_count) {
1454 pki_sni_entry *pki_sni_entry_list;
1457 m_context->setup_data.validate_sni_call_back(name,
1458 m_context->setup_data.sni_call_back_arg));
1464 pki_sni_entry_list = mbedtls_realloc(m_context->pki_sni_entry_list,
1465 (i+1)*
sizeof(pki_sni_entry));
1467 if (pki_sni_entry_list ==
NULL) {
1471 m_context->pki_sni_entry_list = pki_sni_entry_list;
1472 memset(&m_context->pki_sni_entry_list[i], 0,
1473 sizeof(m_context->pki_sni_entry_list[i]));
1474 m_context->pki_sni_entry_list[i].sni = name;
1475 m_context->pki_sni_entry_list[i].pki_key = *new_entry;
1476 sni_setup_data = m_context->setup_data;
1477 sni_setup_data.pki_key = *new_entry;
1478 if (setup_pki_credentials(&m_context->pki_sni_entry_list[i].cacert,
1479 &m_context->pki_sni_entry_list[i].public_cert,
1480 &m_context->pki_sni_entry_list[i].private_key,
1489 m_context->pki_sni_count++;
1494 mbedtls_ssl_set_hs_ca_chain(ssl, &m_context->pki_sni_entry_list[i].cacert,
1496 return mbedtls_ssl_set_hs_own_cert(ssl,
1497 &m_context->pki_sni_entry_list[i].public_cert,
1498 &m_context->pki_sni_entry_list[i].private_key);
1501#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1506psk_sni_callback(
void *p_info, mbedtls_ssl_context *ssl,
1507 const unsigned char *uname,
size_t name_len) {
1510 coap_mbedtls_context_t *m_context =
1514 name = mbedtls_malloc(name_len+1);
1518 memcpy(name, uname, name_len);
1519 name[name_len] =
'\000';
1522 for (i = 0; i < m_context->psk_sni_count; i++) {
1523 if (strcasecmp(name, m_context->psk_sni_entry_list[i].sni) == 0) {
1527 if (i == m_context->psk_sni_count) {
1532 psk_sni_entry *psk_sni_entry_list;
1535 c_session->
context->spsk_setup_data.validate_sni_call_back(name,
1537 c_session->
context->spsk_setup_data.sni_call_back_arg));
1543 psk_sni_entry_list = mbedtls_realloc(m_context->psk_sni_entry_list,
1544 (i+1)*
sizeof(psk_sni_entry));
1546 if (psk_sni_entry_list ==
NULL) {
1550 m_context->psk_sni_entry_list = psk_sni_entry_list;
1551 m_context->psk_sni_entry_list[i].sni = name;
1552 m_context->psk_sni_entry_list[i].psk_info = *new_entry;
1554 m_context->psk_sni_count++;
1560 &m_context->psk_sni_entry_list[i].psk_info.hint);
1562 &m_context->psk_sni_entry_list[i].psk_info.key);
1563#if MBEDTLS_VERSION_NUMBER >= 0x04000000
1567 return mbedtls_ssl_set_hs_psk(ssl,
1568 m_context->psk_sni_entry_list[i].psk_info.key.s,
1569 m_context->psk_sni_entry_list[i].psk_info.key.length);
1576 coap_mbedtls_env_t *m_env) {
1577 coap_mbedtls_context_t *m_context =
1580 m_context->psk_pki_enabled |= IS_SERVER;
1582 mbedtls_ssl_cookie_init(&m_env->cookie_ctx);
1583 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1584 MBEDTLS_SSL_IS_SERVER,
1586 MBEDTLS_SSL_TRANSPORT_DATAGRAM :
1587 MBEDTLS_SSL_TRANSPORT_STREAM,
1588 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
1589 coap_log_err(
"mbedtls_ssl_config_defaults returned -0x%x: '%s'\n",
1590 -ret, get_error_string(ret));
1594#if !COAP_USE_PSA_CRYPTO
1595 mbedtls_ssl_conf_rng(&m_env->conf, mbedtls_ctr_drbg_random, &m_env->ctr_drbg);
1598#if defined(MBEDTLS_SSL_PROTO_DTLS)
1603 if (m_context->psk_pki_enabled & IS_PSK) {
1604#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1605 mbedtls_ssl_conf_psk_cb(&m_env->conf, psk_server_callback, c_session);
1606 if (c_session->
context->spsk_setup_data.validate_sni_call_back) {
1607 mbedtls_ssl_conf_sni(&m_env->conf, psk_sni_callback, c_session);
1609#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1610 m_env->ec_jpake = c_session->
context->spsk_setup_data.ec_jpake;
1617 if (m_context->psk_pki_enabled & IS_PKI) {
1618 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1619 &m_env->private_key, m_env, m_context,
1620 c_session, &m_context->setup_data,
1626 if (m_context->setup_data.validate_sni_call_back) {
1627 mbedtls_ssl_conf_sni(&m_env->conf, pki_sni_callback, c_session);
1631#if COAP_USE_PSA_CRYPTO
1632 if ((ret = mbedtls_ssl_cookie_setup(&m_env->cookie_ctx)) != 0) {
1634 if ((ret = mbedtls_ssl_cookie_setup(&m_env->cookie_ctx,
1635 mbedtls_ctr_drbg_random,
1636 &m_env->ctr_drbg)) != 0) {
1638 coap_log_err(
"mbedtls_ssl_cookie_setup: returned -0x%x: '%s'\n",
1639 -ret, get_error_string(ret));
1643#if defined(MBEDTLS_SSL_PROTO_DTLS)
1644 mbedtls_ssl_conf_dtls_cookies(&m_env->conf, mbedtls_ssl_cookie_write,
1645 mbedtls_ssl_cookie_check,
1646 &m_env->cookie_ctx);
1647#if MBEDTLS_VERSION_NUMBER >= 0x02100100
1648 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
1651#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
1666#if COAP_CLIENT_SUPPORT
1667static int *psk_ciphers =
NULL;
1668static int *pki_ciphers =
NULL;
1669static int *ecjpake_ciphers =
NULL;
1670static int processed_ciphers = 0;
1672#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1674coap_ssl_ciphersuite_uses_psk(
const mbedtls_ssl_ciphersuite_t *info) {
1675#if COAP_USE_PSA_CRYPTO
1676 switch (info->key_exchange) {
1677 case MBEDTLS_KEY_EXCHANGE_PSK:
1678 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
1680 case MBEDTLS_KEY_EXCHANGE_NONE:
1681 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
1682 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
1683 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
1687#elif MBEDTLS_VERSION_NUMBER >= 0x03060000
1688 switch (info->key_exchange) {
1689 case MBEDTLS_KEY_EXCHANGE_PSK:
1690 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
1691 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
1692 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
1694 case MBEDTLS_KEY_EXCHANGE_NONE:
1695 case MBEDTLS_KEY_EXCHANGE_RSA:
1696 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
1697 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
1698 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
1699 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
1700 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
1701 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
1706 return mbedtls_ssl_ciphersuite_uses_psk(info);
1712set_ciphersuites(mbedtls_ssl_config *conf, coap_enc_method_t method) {
1713 if (!processed_ciphers) {
1714 const int *list = mbedtls_ssl_list_ciphersuites();
1715 const int *base = list;
1718#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1720 int ecjpake_count = 1;
1726 const mbedtls_ssl_ciphersuite_t *cur =
1727 mbedtls_ssl_ciphersuite_from_id(*list);
1730#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1731 if (cur->max_tls_version < MBEDTLS_SSL_VERSION_TLS1_2) {
1735 if (cur->max_minor_ver < MBEDTLS_SSL_MINOR_VERSION_3) {
1739#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1740 else if (cur->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
1744#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1745 else if (cur->min_tls_version >= MBEDTLS_SSL_VERSION_TLS1_3) {
1750#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1751 else if (coap_ssl_ciphersuite_uses_psk(cur)) {
1763 psk_ciphers = mbedtls_malloc(psk_count *
sizeof(psk_ciphers[0]));
1764 if (psk_ciphers ==
NULL) {
1765 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", psk_count);
1768 pki_ciphers = mbedtls_malloc(pki_count *
sizeof(pki_ciphers[0]));
1769 if (pki_ciphers ==
NULL) {
1770 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", pki_count);
1771 mbedtls_free(psk_ciphers);
1775#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1776 ecjpake_ciphers = mbedtls_malloc(ecjpake_count *
sizeof(ecjpake_ciphers[0]));
1777 if (ecjpake_ciphers ==
NULL) {
1778 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", pki_count);
1779 mbedtls_free(psk_ciphers);
1780 mbedtls_free(pki_ciphers);
1787 psk_list = psk_ciphers;
1788 pki_list = pki_ciphers;
1789#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1790 ecjpake_list = ecjpake_ciphers;
1794 const mbedtls_ssl_ciphersuite_t *cur =
1795 mbedtls_ssl_ciphersuite_from_id(*list);
1797#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1798 if (cur->max_tls_version < MBEDTLS_SSL_VERSION_TLS1_2) {
1802 if (cur->max_minor_ver < MBEDTLS_SSL_MINOR_VERSION_3) {
1806#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1807 else if (cur->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
1808 *ecjpake_list = *list;
1812#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1813 else if (cur->min_tls_version >= MBEDTLS_SSL_VERSION_TLS1_3) {
1820#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1821 else if (coap_ssl_ciphersuite_uses_psk(cur)) {
1836 processed_ciphers = 1;
1840 mbedtls_ssl_conf_ciphersuites(conf, psk_ciphers);
1843 mbedtls_ssl_conf_ciphersuites(conf, pki_ciphers);
1845 case COAP_ENC_ECJPAKE:
1846 mbedtls_ssl_conf_ciphersuites(conf, ecjpake_ciphers);
1856 coap_mbedtls_env_t *m_env) {
1859 coap_mbedtls_context_t *m_context =
1862 m_context->psk_pki_enabled |= IS_CLIENT;
1864 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1865 MBEDTLS_SSL_IS_CLIENT,
1867 MBEDTLS_SSL_TRANSPORT_DATAGRAM :
1868 MBEDTLS_SSL_TRANSPORT_STREAM,
1869 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
1870 coap_log_err(
"mbedtls_ssl_config_defaults returned -0x%x: '%s'\n",
1871 -ret, get_error_string(ret));
1875#if defined(MBEDTLS_SSL_PROTO_DTLS)
1880 mbedtls_ssl_conf_authmode(&m_env->conf, MBEDTLS_SSL_VERIFY_REQUIRED);
1881#if !COAP_USE_PSA_CRYPTO
1882 mbedtls_ssl_conf_rng(&m_env->conf, mbedtls_ctr_drbg_random, &m_env->ctr_drbg);
1885 if (m_context->psk_pki_enabled & IS_PSK) {
1886#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1894 if (psk_key ==
NULL || psk_identity ==
NULL) {
1895 ret = MBEDTLS_ERR_SSL_ALLOC_FAILED;
1899 if ((ret = mbedtls_ssl_conf_psk(&m_env->conf, psk_key->
s,
1900 psk_key->
length, psk_identity->
s,
1901 psk_identity->
length)) != 0) {
1902 coap_log_err(
"mbedtls_ssl_conf_psk returned -0x%x: '%s'\n",
1903 -ret, get_error_string(ret));
1907 if ((ret = mbedtls_ssl_set_hostname(&m_env->ssl,
1909 coap_log_err(
"mbedtls_ssl_set_hostname returned -0x%x: '%s'\n",
1910 -ret, get_error_string(ret));
1916#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1918 m_env->ec_jpake = 1;
1919 set_ciphersuites(&m_env->conf, COAP_ENC_ECJPAKE);
1920#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1921 mbedtls_ssl_conf_max_tls_version(&m_env->conf, MBEDTLS_SSL_VERSION_TLS1_2);
1924 set_ciphersuites(&m_env->conf, COAP_ENC_PSK);
1927 set_ciphersuites(&m_env->conf, COAP_ENC_PSK);
1932 }
else if ((m_context->psk_pki_enabled & IS_PKI) ||
1933 (m_context->psk_pki_enabled & (IS_PSK | IS_PKI)) == 0) {
1940 if (!(m_context->psk_pki_enabled & IS_PKI)) {
1954 mbedtls_ssl_conf_authmode(&m_env->conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
1955 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1956 &m_env->private_key, m_env, m_context,
1957 c_session, setup_data,
1963#if defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_SSL_ALPN)
1966 static const char *alpn_list[] = {
"coap",
NULL };
1968 ret = mbedtls_ssl_conf_alpn_protocols(&m_env->conf, alpn_list);
1974 mbedtls_ssl_set_hostname(&m_env->ssl, m_context->setup_data.client_sni);
1975#if defined(MBEDTLS_SSL_PROTO_DTLS)
1976#if MBEDTLS_VERSION_NUMBER >= 0x02100100
1977 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
1980 set_ciphersuites(&m_env->conf, COAP_ENC_PKI);
1990mbedtls_cleanup(coap_mbedtls_env_t *m_env) {
1995 mbedtls_x509_crt_free(&m_env->cacert);
1996 mbedtls_x509_crt_free(&m_env->public_cert);
1997 mbedtls_pk_free(&m_env->private_key);
1998#if !COAP_USE_PSA_CRYPTO
1999 mbedtls_entropy_free(&m_env->entropy);
2000 mbedtls_ctr_drbg_free(&m_env->ctr_drbg);
2002 mbedtls_ssl_config_free(&m_env->conf);
2003 mbedtls_ssl_free(&m_env->ssl);
2004 mbedtls_ssl_cookie_free(&m_env->cookie_ctx);
2008coap_dtls_free_mbedtls_env(coap_mbedtls_env_t *m_env) {
2010 if (!m_env->sent_alert)
2011 mbedtls_ssl_close_notify(&m_env->ssl);
2012 mbedtls_cleanup(m_env);
2013 mbedtls_free(m_env);
2017#if COAP_MAX_LOGGING_LEVEL > 0
2019report_mbedtls_alert(
unsigned char alert) {
2021 case MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC:
2022 return ": Bad Record MAC";
2023 case MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE:
2024 return ": Handshake failure";
2025 case MBEDTLS_SSL_ALERT_MSG_NO_CERT:
2026 return ": No Certificate provided";
2027 case MBEDTLS_SSL_ALERT_MSG_BAD_CERT:
2028 return ": Certificate is bad";
2029 case MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN:
2030 return ": Certificate is unknown";
2031 case MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA:
2032 return ": CA is unknown";
2033 case MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED:
2034 return ": Access was denied";
2035 case MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR:
2036 return ": Decrypt error";
2050 coap_mbedtls_env_t *m_env) {
2054 ret = mbedtls_ssl_handshake(&m_env->ssl);
2057 m_env->established = 1;
2061#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2062#if COAP_CLIENT_SUPPORT
2065 coap_mbedtls_context_t *m_context;
2069 m_context->setup_data.use_cid) {
2070 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX];
2072 size_t peer_cid_len;
2075 if (mbedtls_ssl_get_peer_cid(&m_env->ssl, &enabled, peer_cid, &peer_cid_len) == 0 &&
2076 enabled == MBEDTLS_SSL_CID_ENABLED) {
2077 c_session->negotiated_cid = 1;
2080 c_session->negotiated_cid = 0;
2087 case MBEDTLS_ERR_SSL_WANT_READ:
2088 case MBEDTLS_ERR_SSL_WANT_WRITE:
2089 if (m_env->ssl.state == MBEDTLS_SSL_SERVER_HELLO
2090#
if MBEDTLS_VERSION_NUMBER >= 0x03030000
2091 || m_env->ssl.state == MBEDTLS_SSL_NEW_SESSION_TICKET
2094 if (++m_env->server_hello_cnt > 10) {
2102 case MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED:
2105 case MBEDTLS_ERR_SSL_INVALID_MAC:
2107#ifdef MBEDTLS_2_X_COMPAT
2108 case MBEDTLS_ERR_SSL_UNKNOWN_CIPHER:
2110 case MBEDTLS_ERR_SSL_DECODE_ERROR:
2113 case MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE:
2114 alert = MBEDTLS_SSL_ALERT_MSG_NO_CERT;
2116#ifdef MBEDTLS_2_X_COMPAT
2117 case MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO:
2118 case MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO:
2119 alert = MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE;
2122 case MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:
2124 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2125 if (m_env->ssl.in_msg[1] != MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY)
2128 report_mbedtls_alert(m_env->ssl.in_msg[1]));
2130 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
2131 case MBEDTLS_ERR_SSL_CONN_EOF:
2132 case MBEDTLS_ERR_NET_CONN_RESET:
2138 "returned -0x%x: '%s'\n",
2139 -ret, get_error_string(ret));
2146 mbedtls_ssl_send_alert_message(&m_env->ssl,
2147 MBEDTLS_SSL_ALERT_LEVEL_FATAL,
2149 m_env->sent_alert = 1;
2154 get_error_string(ret));
2156 mbedtls_ssl_session_reset(&m_env->ssl);
2157#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2158 if (m_env->ec_jpake) {
2161#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
2167#elif COAP_CLIENT_SUPPORT
2173 mbedtls_ssl_set_hs_ecjpake_password(&m_env->ssl, psk_key->
s, psk_key->
length);
2181mbedtls_debug_out(
void *ctx
COAP_UNUSED,
int level,
2214#if !COAP_DISABLE_TCP
2222coap_sock_read(
void *ctx,
unsigned char *out,
size_t outl) {
2223 int ret = MBEDTLS_ERR_SSL_CONN_EOF;
2230 if (errno == ECONNRESET) {
2232 ret = MBEDTLS_ERR_SSL_CONN_EOF;
2234 ret = MBEDTLS_ERR_NET_RECV_FAILED;
2236 }
else if (ret == 0) {
2238 ret = MBEDTLS_ERR_SSL_WANT_READ;
2251coap_sock_write(
void *context,
const unsigned char *in,
size_t inl) {
2256 (
const uint8_t *)in,
2262 (errno == EPIPE || errno == ECONNRESET)) {
2277 int lasterror = WSAGetLastError();
2279 if (lasterror == WSAEWOULDBLOCK) {
2280 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
2281 }
else if (lasterror == WSAECONNRESET) {
2282 ret = MBEDTLS_ERR_NET_CONN_RESET;
2285 if (errno == EAGAIN || errno == EINTR) {
2286 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
2287 }
else if (errno == EPIPE || errno == ECONNRESET) {
2288 ret = MBEDTLS_ERR_NET_CONN_RESET;
2292 ret = MBEDTLS_ERR_NET_SEND_FAILED;
2301 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
2307static coap_mbedtls_env_t *
2311#if !COAP_USE_PSA_CRYPTO
2314 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2319 m_env = (coap_mbedtls_env_t *)mbedtls_malloc(
sizeof(coap_mbedtls_env_t));
2323 memset(m_env, 0,
sizeof(coap_mbedtls_env_t));
2325 mbedtls_ssl_init(&m_env->ssl);
2326#if !COAP_USE_PSA_CRYPTO
2327 mbedtls_ctr_drbg_init(&m_env->ctr_drbg);
2328 mbedtls_entropy_init(&m_env->entropy);
2330 mbedtls_ssl_config_init(&m_env->conf);
2332#if defined(ESPIDF_VERSION) && defined(CONFIG_MBEDTLS_DEBUG)
2333 mbedtls_esp_enable_debug_log(&m_env->conf, CONFIG_MBEDTLS_DEBUG_LEVEL);
2336#if !COAP_USE_PSA_CRYPTO
2337 if ((ret = mbedtls_ctr_drbg_seed(&m_env->ctr_drbg,
2338 mbedtls_entropy_func, &m_env->entropy,
NULL, 0)) != 0) {
2339 if (ret != MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED) {
2340 coap_log_info(
"mbedtls_ctr_drbg_seed returned -0x%x: '%s'\n",
2341 -ret, get_error_string(ret));
2344 coap_log_err(
"mbedtls_ctr_drbg_seed returned -0x%x: '%s'\n",
2345 -ret, get_error_string(ret));
2350#if COAP_CLIENT_SUPPORT
2351 if (setup_client_ssl_session(c_session, m_env) != 0) {
2358#if defined(MBEDTLS_SSL_SRV_C)
2359 if (setup_server_ssl_session(c_session, m_env) != 0) {
2369#if MBEDTLS_VERSION_NUMBER >= 0x03020000
2370 mbedtls_ssl_conf_min_tls_version(&m_env->conf, MBEDTLS_SSL_VERSION_TLS1_2);
2372 mbedtls_ssl_conf_min_version(&m_env->conf, MBEDTLS_SSL_MAJOR_VERSION_3,
2373 MBEDTLS_SSL_MINOR_VERSION_3);
2376 if (mbedtls_ssl_setup(&m_env->ssl, &m_env->conf) != 0) {
2380 mbedtls_ssl_set_bio(&m_env->ssl, c_session, coap_dgram_write,
2381 coap_dgram_read,
NULL);
2382#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2385#if COAP_CLIENT_SUPPORT
2386 coap_mbedtls_context_t *m_context =
2390 m_context->setup_data.use_cid) {
2398 mbedtls_ssl_set_cid(&m_env->ssl, MBEDTLS_SSL_CID_ENABLED,
NULL, 0);
2402#if COAP_SERVER_SUPPORT
2412 mbedtls_ssl_set_cid(&m_env->ssl, MBEDTLS_SSL_CID_ENABLED, cid,
2420#if !COAP_DISABLE_TCP
2423 mbedtls_ssl_set_bio(&m_env->ssl, c_session, coap_sock_write,
2424 coap_sock_read,
NULL);
2427#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2428 coap_mbedtls_context_t *m_context =
2430 if ((m_context->psk_pki_enabled & IS_PSK) &&
2434#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
2440#elif COAP_CLIENT_SUPPORT
2445 mbedtls_ssl_set_hs_ecjpake_password(&m_env->ssl, psk_key->
s, psk_key->
length);
2449 mbedtls_ssl_set_timer_cb(&m_env->ssl, &m_env->timer,
2450 zephyr_timing_set_delay,
2451 zephyr_timing_get_delay);
2453 mbedtls_ssl_set_timer_cb(&m_env->ssl, &m_env->timer,
2454 mbedtls_timing_set_delay,
2455 mbedtls_timing_get_delay);
2458 mbedtls_ssl_conf_dbg(&m_env->conf, mbedtls_debug_out, stdout);
2463 mbedtls_free(m_env);
2470#if defined(MBEDTLS_SSL_PROTO_DTLS)
2473 static int reported = 0;
2477 " - update Mbed TLS to include DTLS\n");
2485#if !COAP_DISABLE_TCP
2534#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2541#if COAP_CLIENT_SUPPORT
2544#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2545 c_context->testing_cids = every;
2557 coap_mbedtls_context_t *m_context;
2560 m_context = (coap_mbedtls_context_t *)mbedtls_malloc(
sizeof(coap_mbedtls_context_t));
2562 memset(m_context, 0,
sizeof(coap_mbedtls_context_t));
2567#if COAP_SERVER_SUPPORT
2576 coap_mbedtls_context_t *m_context =
2579#if !defined(MBEDTLS_SSL_SRV_C)
2581 " libcoap not compiled for Server Mode for Mbed TLS"
2582 " - update Mbed TLS to include Server Mode\n");
2585 if (!m_context || !setup_data)
2589#ifndef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2590 coap_log_warn(
"Mbed TLS not compiled for EC-JPAKE support\n");
2593 m_context->psk_pki_enabled |= IS_PSK;
2598#if COAP_CLIENT_SUPPORT
2607#if !defined(MBEDTLS_SSL_CLI_C)
2612 " libcoap not compiled for Client Mode for Mbed TLS"
2613 " - update Mbed TLS to include Client Mode\n");
2616 coap_mbedtls_context_t *m_context =
2619 if (!m_context || !setup_data)
2623 coap_log_warn(
"CoAP Client with Mbed TLS does not support Identity Hint selection\n");
2626#ifndef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2627 coap_log_warn(
"Mbed TLS not compiled for EC-JPAKE support\n");
2631#ifndef MBEDTLS_SSL_DTLS_CONNECTION_ID
2632 coap_log_warn(
"Mbed TLS not compiled for Connection-ID support\n");
2635 m_context->psk_pki_enabled |= IS_PSK;
2645 coap_mbedtls_context_t *m_context =
2648 m_context->setup_data = *setup_data;
2649 if (!m_context->setup_data.verify_peer_cert) {
2651 m_context->setup_data.check_common_ca = 0;
2653 m_context->setup_data.allow_self_signed = 1;
2654 m_context->setup_data.allow_expired_certs = 1;
2655 m_context->setup_data.cert_chain_validation = 1;
2656 m_context->setup_data.cert_chain_verify_depth = 10;
2657 m_context->setup_data.check_cert_revocation = 1;
2658 m_context->setup_data.allow_no_crl = 1;
2659 m_context->setup_data.allow_expired_crl = 1;
2660 m_context->setup_data.allow_bad_md_hash = 1;
2661 m_context->setup_data.allow_short_rsa_length = 1;
2663 m_context->psk_pki_enabled |= IS_PKI;
2665#ifndef MBEDTLS_SSL_DTLS_CONNECTION_ID
2666 coap_log_warn(
"Mbed TLS not compiled for Connection-ID support\n");
2674 const char *ca_file,
2675 const char *ca_path) {
2676 coap_mbedtls_context_t *m_context =
2680 coap_log_warn(
"coap_context_set_pki_root_cas: (D)TLS environment "
2685 if (ca_file ==
NULL && ca_path ==
NULL) {
2686 coap_log_warn(
"coap_context_set_pki_root_cas: ca_file and/or ca_path "
2690 if (m_context->root_ca_file) {
2691 mbedtls_free(m_context->root_ca_file);
2692 m_context->root_ca_file =
NULL;
2696 m_context->root_ca_file = mbedtls_strdup(ca_file);
2699 if (m_context->root_ca_path) {
2700 mbedtls_free(m_context->root_ca_path);
2701 m_context->root_ca_path =
NULL;
2705 m_context->root_ca_path = mbedtls_strdup(ca_path);
2716 coap_mbedtls_context_t *m_context =
2720 coap_log_warn(
"coap_context_load_pki_trust_store: (D)TLS environment "
2724 m_context->trust_store_defined = 1;
2733 coap_mbedtls_context_t *m_context =
2735 return m_context->psk_pki_enabled ? 1 : 0;
2740 coap_mbedtls_context_t *m_context = (coap_mbedtls_context_t *)dtls_context;
2743 for (i = 0; i < m_context->pki_sni_count; i++) {
2744 mbedtls_free(m_context->pki_sni_entry_list[i].sni);
2746 mbedtls_x509_crt_free(&m_context->pki_sni_entry_list[i].public_cert);
2748 mbedtls_pk_free(&m_context->pki_sni_entry_list[i].private_key);
2750 mbedtls_x509_crt_free(&m_context->pki_sni_entry_list[i].cacert);
2752 if (m_context->pki_sni_entry_list)
2753 mbedtls_free(m_context->pki_sni_entry_list);
2755 for (i = 0; i < m_context->psk_sni_count; i++) {
2756 mbedtls_free(m_context->psk_sni_entry_list[i].sni);
2758 if (m_context->psk_sni_entry_list)
2759 mbedtls_free(m_context->psk_sni_entry_list);
2761 if (m_context->root_ca_path)
2762 mbedtls_free(m_context->root_ca_path);
2763 if (m_context->root_ca_file)
2764 mbedtls_free(m_context->root_ca_file);
2766 mbedtls_free(m_context);
2769#if COAP_CLIENT_SUPPORT
2772#if !defined(MBEDTLS_SSL_CLI_C)
2775 " libcoap not compiled for Client Mode for Mbed TLS"
2776 " - update Mbed TLS to include Client Mode\n");
2779 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
2788 m_env->last_timeout = now;
2789 ret = do_mbedtls_handshake(c_session, m_env);
2791 coap_dtls_free_mbedtls_env(m_env);
2800#if COAP_SERVER_SUPPORT
2803#if !defined(MBEDTLS_SSL_SRV_C)
2806 " libcoap not compiled for Server Mode for Mbed TLS"
2807 " - update Mbed TLS to include Server Mode\n");
2810 coap_mbedtls_env_t *m_env =
2811 (coap_mbedtls_env_t *)c_session->
tls;
2813#if defined(MBEDTLS_SSL_PROTO_DTLS)
2814#if MBEDTLS_VERSION_NUMBER >= 0x02100100
2815 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
2826 if (c_session && c_session->
context && c_session->
tls) {
2827 coap_dtls_free_mbedtls_env(c_session->
tls);
2836#if defined(MBEDTLS_SSL_PROTO_DTLS)
2837 coap_mbedtls_env_t *m_env =
2838 (coap_mbedtls_env_t *)c_session->
tls;
2840#if MBEDTLS_VERSION_NUMBER >= 0x02100100
2841 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
2851 const uint8_t *data,
size_t data_len) {
2853 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2855 assert(m_env !=
NULL);
2863 if (m_env->established) {
2864 ret = mbedtls_ssl_write(&m_env->ssl, (
const unsigned char *) data, data_len);
2867 case MBEDTLS_ERR_SSL_WANT_READ:
2868 case MBEDTLS_ERR_SSL_WANT_WRITE:
2871 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2877 "returned -0x%x: '%s'\n",
2878 -ret, get_error_string(ret));
2887 ret = do_mbedtls_handshake(c_session, m_env);
2917 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2919 int ret = zephyr_timing_get_delay(&m_env->timer);
2921 int ret = mbedtls_timing_get_delay(&m_env->timer);
2923 unsigned int scalar = 1 << m_env->retry_scalar;
2933 m_env->last_timeout = now;
2946 m_env->last_timeout = now;
2964 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2967 m_env->retry_scalar++;
2969 (do_mbedtls_handshake(c_session, m_env) < 0)) {
2984 const uint8_t *data,
2989 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2990 coap_ssl_t *ssl_data;
2992 assert(m_env !=
NULL);
2994 ssl_data = &m_env->coap_ssl_data;
2995 if (ssl_data->pdu_len) {
2996 coap_log_err(
"** %s: Previous data not read %u bytes\n",
2999 ssl_data->pdu = data;
3000 ssl_data->pdu_len = (unsigned)data_len;
3002 if (m_env->established) {
3003#if COAP_CONSTRAINED_STACK
3016 ret = mbedtls_ssl_read(&m_env->ssl, pdu,
sizeof(pdu));
3021 if (!c_session->
tls) {
3029 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
3030 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
3033 case MBEDTLS_ERR_SSL_WANT_READ:
3037 "returned -0x%x: '%s' (length %" PRIdS ")\n",
3038 -ret, get_error_string(ret), data_len);
3043 ret = do_mbedtls_handshake(c_session, m_env);
3048 if (ssl_data->pdu_len) {
3050 ret = do_mbedtls_handshake(c_session, m_env);
3069 if (ssl_data && ssl_data->pdu_len) {
3071 coap_log_debug(
"coap_dtls_receive: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
3072 ssl_data->pdu_len = 0;
3073 ssl_data->pdu =
NULL;
3078#if COAP_SERVER_SUPPORT
3086 const uint8_t *data,
3088#if !defined(MBEDTLS_SSL_PROTO_DTLS) || !defined(MBEDTLS_SSL_SRV_C)
3093 " libcoap not compiled for DTLS or Server Mode for Mbed TLS"
3094 " - update Mbed TLS to include DTLS and Server Mode\n");
3097 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3098 coap_ssl_t *ssl_data;
3105 c_session->
tls = m_env;
3112 if ((ret = mbedtls_ssl_set_client_transport_id(&m_env->ssl,
3115 coap_log_err(
"mbedtls_ssl_set_client_transport_id() returned -0x%x: '%s'\n",
3116 -ret, get_error_string(ret));
3120 ssl_data = &m_env->coap_ssl_data;
3121 if (ssl_data->pdu_len) {
3122 coap_log_err(
"** %s: Previous data not read %u bytes\n",
3125 ssl_data->pdu = data;
3126 ssl_data->pdu_len = (unsigned)data_len;
3128 ret = do_mbedtls_handshake(c_session, m_env);
3129 if (ret == 0 || m_env->seen_client_hello) {
3135 m_env->seen_client_hello = 0;
3141 if (ssl_data->pdu_len) {
3143 coap_log_debug(
"coap_dtls_hello: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
3144 ssl_data->pdu_len = 0;
3145 ssl_data->pdu =
NULL;
3154 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3155 int expansion = mbedtls_ssl_get_record_expansion(&m_env->ssl);
3157 if (expansion == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE) {
3163#if !COAP_DISABLE_TCP
3164#if COAP_CLIENT_SUPPORT
3167#if !defined(MBEDTLS_SSL_CLI_C)
3171 " libcoap not compiled for Client Mode for Mbed TLS"
3172 " - update Mbed TLS to include Client Mode\n");
3175 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
3185 m_env->last_timeout = now;
3186 c_session->
tls = m_env;
3187 ret = do_mbedtls_handshake(c_session, m_env);
3197#if COAP_SERVER_SUPPORT
3200#if !defined(MBEDTLS_SSL_SRV_C)
3205 " libcoap not compiled for Server Mode for Mbed TLS"
3206 " - update Mbed TLS to include Server Mode\n");
3209 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
3217 c_session->
tls = m_env;
3218 ret = do_mbedtls_handshake(c_session, m_env);
3243 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3244 size_t amount_sent = 0;
3246 assert(m_env !=
NULL);
3253 if (m_env->established) {
3254 while (amount_sent < data_len) {
3255 ret = mbedtls_ssl_write(&m_env->ssl, &data[amount_sent],
3256 data_len - amount_sent);
3259 case MBEDTLS_ERR_SSL_WANT_READ:
3260 case MBEDTLS_ERR_SSL_WANT_WRITE:
3267 case MBEDTLS_ERR_NET_CONN_RESET:
3268 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
3273 "returned -0x%x: '%s'\n",
3274 -ret, get_error_string(ret));
3286 ret = do_mbedtls_handshake(c_session, m_env);
3304 if (ret == (ssize_t)data_len)
3323 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3332 if (!m_env->established && !m_env->sent_alert) {
3333 ret = do_mbedtls_handshake(c_session, m_env);
3342 ret = mbedtls_ssl_read(&m_env->ssl, data, data_len);
3346 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
3350 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
3352 m_env->sent_alert = 1;
3355#if MBEDTLS_VERSION_NUMBER >= 0x03060000
3356 case MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET:
3358 case MBEDTLS_ERR_SSL_WANT_READ:
3364 "returned -0x%x: '%s' (length %" PRIdS ")\n",
3365 -ret, get_error_string(ret), data_len);
3369 }
else if (ret < (
int)data_len) {
3370 c_session->
sock.
flags &= ~COAP_SOCKET_CAN_READ;
3392#if COAP_USE_PSA_CRYPTO || defined(MBEDTLS_PSA_CRYPTO_C)
3399#if COAP_CLIENT_SUPPORT
3400 mbedtls_free(psk_ciphers);
3401 mbedtls_free(pki_ciphers);
3402 mbedtls_free(ecjpake_ciphers);
3405 ecjpake_ciphers =
NULL;
3406 processed_ciphers = 0;
3409#if COAP_USE_PSA_CRYPTO || defined(MBEDTLS_PSA_CRYPTO_C)
3410 mbedtls_psa_crypto_free();
3423 if (c_session && c_session->
tls) {
3424 coap_mbedtls_env_t *m_env;
3427 memcpy(&m_env, &c_session->
tls,
sizeof(m_env));
3429 return (
void *)&m_env->ssl;
3438#if !defined(ESPIDF_VERSION)
3448 switch ((
int)level) {
3469 mbedtls_debug_set_threshold(use_level);
3471 keep_log_level = level;
3476 return keep_log_level;
3482 version.
version = mbedtls_version_get_number();
3488#if COAP_SERVER_SUPPORT
3490coap_digest_setup(
void) {
3491 coap_crypto_sha256_ctx_t *digest_ctx = mbedtls_malloc(
sizeof(coap_crypto_sha256_ctx_t));
3494 if (coap_crypto_sha256_init(digest_ctx) != 0) {
3495 coap_digest_free(digest_ctx);
3503coap_digest_free(coap_digest_ctx_t *digest_ctx) {
3505 coap_crypto_sha256_free(digest_ctx);
3506 mbedtls_free(digest_ctx);
3511coap_digest_update(coap_digest_ctx_t *digest_ctx,
3512 const uint8_t *data,
3514 return coap_crypto_sha256_update(digest_ctx, data, data_len) == 0;
3518coap_digest_final(coap_digest_ctx_t *digest_ctx,
3519 coap_digest_t *digest_buffer) {
3520 int ret = coap_crypto_sha256_finish(digest_ctx, (uint8_t *)digest_buffer) == 0;
3521 coap_digest_free(digest_ctx);
3531 coap_crypto_md_type_t md_type;
3536 md_type = COAP_CRYPTO_MD_SHA1;
3539 md_type = COAP_CRYPTO_MD_SHA256;
3542 md_type = COAP_CRYPTO_MD_SHA512;
3545 coap_log_debug(
"coap_crypto_hash: algorithm %d not supported\n", alg);
3549 hash_len = coap_crypto_hash_size(md_type);
3557 if (coap_crypto_hash_compute(md_type, data->
s, data->
length,
3568#if COAP_OSCORE_SUPPORT
3578get_cipher_key_size(
cose_alg_t alg,
size_t *key_size) {
3589 coap_log_debug(
"get_cipher_key_size: COSE cipher %d not supported\n", alg);
3599 coap_crypto_md_type_t *md_type,
3601 switch ((
int)hmac_alg) {
3604 *md_type = COAP_CRYPTO_MD_SHA256;
3610 *md_type = COAP_CRYPTO_MD_SHA384;
3616 *md_type = COAP_CRYPTO_MD_SHA512;
3621 coap_log_debug(
"get_hmac_params: COSE HMAC %d not supported\n", hmac_alg);
3628 return get_cipher_key_size(alg,
NULL);
3637 return get_hmac_params(hmac_alg,
NULL,
NULL);
3645 size_t *max_result_len) {
3651 assert(params !=
NULL);
3657 if (!get_cipher_key_size(params->
alg,
NULL)) {
3658 coap_log_debug(
"coap_crypto_aead_encrypt: algorithm %d not supported\n",
3665 if (coap_crypto_aead_encrypt_ccm(ccm->
key.
s, ccm->
key.
length,
3667 aad ? aad->
s :
NULL, aad ? aad->length : 0,
3668 data->s, data->length,
3669 result, *max_result_len, max_result_len,
3670 ccm->tag_len) != 0) {
3683 size_t *max_result_len) {
3689 assert(params !=
NULL);
3695 if (!get_cipher_key_size(params->
alg,
NULL)) {
3696 coap_log_debug(
"coap_crypto_aead_decrypt: algorithm %d not supported\n",
3708 if (coap_crypto_aead_decrypt_ccm(ccm->
key.
s, ccm->
key.
length,
3710 aad ? aad->
s :
NULL, aad ? aad->length : 0,
3711 data->s, data->length,
3712 result, *max_result_len, max_result_len,
3713 ccm->tag_len) != 0) {
3726 coap_crypto_md_type_t md_type;
3734 if (!get_hmac_params(hmac_alg, &md_type, &mac_len)) {
3735 coap_log_debug(
"coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
3743 if (coap_crypto_hmac_compute(md_type, key->
s, key->
length,
3763#pragma GCC diagnostic ignored "-Wunused-function"
static size_t strnlen(const char *s, size_t maxlen)
A length-safe strlen() fake.
#define COAP_SERVER_SUPPORT
const char * coap_socket_strerror(void)
#define COAP_RXBUFFER_SIZE
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
Library specific build wrapper for coap_internal.h.
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
void coap_dtls_free_context(void *handle COAP_UNUSED)
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
void coap_ticks(coap_tick_t *t)
Returns the current value of an internal tick counter.
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
#define COAP_DTLS_RETRANSMIT_MS
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
void coap_dtls_thread_shutdown(void)
Close down the underlying (D)TLS Library layer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
#define COAP_DTLS_CID_LENGTH
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
#define COAP_DTLS_RETRANSMIT_COAP_TICKS
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
#define COAP_DTLS_RETRANSMIT_TOTAL_MS
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_KEY_ROOT_CA
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
@ COAP_TLS_LIBRARY_MBEDTLS
Using Mbed TLS library.
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
#define coap_lock_callback_ret(r, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
#define coap_log_emerg(...)
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
#define coap_dtls_log(level,...)
Logging function.
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
#define coap_log_warn(...)
#define coap_log_err(...)
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
@ COSE_HMAC_ALG_HMAC384_384
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_HMAC_ALG_HMAC512_512
@ COSE_ALGORITHM_SHA_256_256
@ COSE_ALGORITHM_AES_CCM_16_64_128
@ COSE_ALGORITHM_AES_CCM_16_64_256
coap_proto_t
CoAP protocol types Note: coap_layers_coap[] needs updating if extended.
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
#define COAP_PROTO_NOT_RELIABLE(p)
@ COAP_SESSION_TYPE_CLIENT
client-side
@ COAP_SESSION_STATE_HANDSHAKE
@ COAP_SESSION_STATE_NONE
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
coap_address_t remote
remote address and port
CoAP binary data definition with const data.
size_t length
length of binary data
const uint8_t * s
read-only binary data
CoAP binary data definition.
The CoAP stack's global state is stored in a coap_context_t object.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
cose_alg_t alg
The COSE algorith to use.
The structure used for defining the Client PSK setup data to be used.
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
char * client_sni
If not NULL, SNI to use in client TLS setup.
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
The structure that holds the PKI key information.
coap_pki_key_define_t define
for definable type keys
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
The structure used for defining the PKI setup data to be used.
uint8_t allow_no_crl
1 ignore if CRL not there
void * cn_call_back_arg
Passed in to the CN callback function.
uint8_t allow_short_rsa_length
1 if small RSA keysizes are allowed
uint8_t cert_chain_validation
1 if to check cert_chain_verify_depth
uint8_t allow_bad_md_hash
1 if unsupported MD hashes are allowed
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
uint8_t check_cert_revocation
1 if revocation checks wanted
uint8_t cert_chain_verify_depth
recommended depth is 3
uint8_t allow_expired_certs
1 if expired certs are allowed
uint8_t verify_peer_cert
Set to COAP_DTLS_PKI_SETUP_VERSION to support this version of the struct.
uint8_t allow_self_signed
1 if self-signed certs are allowed.
coap_dtls_cn_callback_t validate_cn_call_back
CN check callback function.
uint8_t allow_expired_crl
1 if expired crl is allowed
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
uint8_t check_common_ca
1 if peer cert is to be signed by the same CA as the local cert
The structure that holds the Server Pre-Shared Key and Identity Hint information.
The structure used for defining the Server PSK setup data to be used.
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
void * id_call_back_arg
Passed in to the Identity callback function.
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
coap_layer_write_t l_write
coap_layer_establish_t l_establish
coap_const_char_ptr_t public_cert
define: Public Cert
coap_const_char_ptr_t private_key
define: Private Key
coap_const_char_ptr_t ca
define: Common CA Certificate
size_t public_cert_len
define Public Cert length (if needed)
size_t ca_len
define CA Cert length (if needed)
coap_pki_define_t private_key_def
define: Private Key type definition
size_t private_key_len
define Private Key length (if needed)
coap_pki_define_t ca_def
define: Common CA type definition
coap_pki_define_t public_cert_def
define: Public Cert type definition
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
unsigned int dtls_timeout_count
dtls setup retry counter
coap_socket_t sock
socket object for the session, if any
coap_session_state_t state
current state of relationship with peer
coap_addr_tuple_t addr_info
remote/local address info
coap_proto_t proto
protocol used
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_session_type_t type
client or server side socket
coap_context_t * context
session's context
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
The structure used for returning the underlying (D)TLS library information.
uint64_t built_version
(D)TLS Built against Library Version
coap_tls_library_t type
Library type.
uint64_t version
(D)TLS runtime Library Version
const char * s_byte
signed char ptr
const uint8_t * u_byte
unsigned char ptr