libcoap 4.3.5-develop-1ba3158
Loading...
Searching...
No Matches
coap_openssl.c
Go to the documentation of this file.
1/*
2 * coap_openssl.c -- Datagram Transport Layer Support for libcoap with openssl
3 *
4 * Copyright (C) 2017 Jean-Claude Michelou <jcm@spinetix.com>
5 * Copyright (C) 2018-2025 Jon Shallow <supjps-libcoap@jpshallow.com>
6 *
7 * SPDX-License-Identifier: BSD-2-Clause
8 *
9 * This file is part of the CoAP library libcoap. Please see README for terms
10 * of use.
11 */
12
19
20#ifdef COAP_WITH_LIBOPENSSL
21
22/*
23 * OpenSSL 1.1.0 has support for making decisions during receipt of
24 * the Client Hello - the call back function is set up using
25 * SSL_CTX_set_tlsext_servername_callback() which is called later in the
26 * Client Hello processing - but called every Client Hello.
27 * Certificates and Preshared Keys have to be set up in the SSL CTX before
28 * SSL_accept() is called, making the code messy to decide whether this is a
29 * PKI or PSK incoming request to handle things accordingly if both are
30 * defined. SNI has to create a new SSL CTX to handle different server names
31 * with different crtificates.
32 *
33 * OpenSSL 1.1.1 introduces a new function SSL_CTX_set_client_hello_cb().
34 * The call back is invoked early on in the Client Hello processing giving
35 * the ability to easily use different Preshared Keys, Certificates etc.
36 * Certificates do not have to be set up in the SSL CTX before SSL_Accept is
37 * called.
38 * Later in the Client Hello code, the callback for
39 * SSL_CTX_set_tlsext_servername_callback() is still called, but only if SNI
40 * is being used by the client, so cannot be used for doing things the
41 * OpenSSL 1.1.0 way.
42 *
43 * OpenSSL 1.1.1 supports TLS1.3.
44 *
45 * There is also support for OpenSSL 3.
46 *
47 * Consequently, this code has to have compile time options to include /
48 * exclude code based on whether compiled against 1.1.0 or 1.1.1, as well as
49 * have additional run time checks.
50 *
51 * It is possible to override the Ciphers, define the Algorithms or Groups,
52 * and/or define the PKCS11 engine id to to use for the SSL negotiations at
53 * compile time. This is done by the adding of the appropriate -D option to
54 * the CPPFLAGS parameter that is used on the ./configure command line.
55 * E.g. ./configure CPPFLAGS="-DXX='\"YY\"' -DUU='\"VV\"'"
56 * The parameter value is case-sensitive.
57 *
58 * The ciphers can be overridden with (example)
59 * -DCOAP_OPENSSL_CIPHERS='\"ECDHE-ECDSA-AES256-GCM-SHA384\"'
60 *
61 * The Algorithms can be defined by (example)
62 * -DCOAP_OPENSSL_SIGALGS='\"ed25519\"'
63 *
64 * The Groups (OpenSSL 1.1.1 or later) can be defined by (example)
65 * -DCOAP_OPENSSL_GROUPS='\"X25519\"'
66 *
67 * The PKCSLL engine ID can be defined by (example)
68 + -DCOAP_OPENSSL_PKCS11_ENGINE_ID='\"pkcs11\"'
69 *
70 */
71#include <openssl/ssl.h>
72#include <openssl/engine.h>
73#include <openssl/err.h>
74#include <openssl/rand.h>
75#include <openssl/hmac.h>
76#include <openssl/x509v3.h>
77
78#if OPENSSL_VERSION_NUMBER >= 0x30000000L
79#ifdef __GNUC__
80/* Ignore OpenSSL 3.0 deprecated warnings for now */
81#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
82#endif
83#if defined(_WIN32)
84#if !defined(__MINGW32__)
85#pragma warning(disable : 4996)
86#endif /* ! __MINGW32__ */
87#endif /* _WIN32 */
88#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
89
90#ifdef COAP_EPOLL_SUPPORT
91# include <sys/epoll.h>
92#endif /* COAP_EPOLL_SUPPORT */
93
94#if OPENSSL_VERSION_NUMBER < 0x10100000L
95#error Must be compiled against OpenSSL 1.1.0 or later
96#endif
97
98#ifdef _WIN32
99#define strcasecmp _stricmp
100#define strncasecmp _strnicmp
101#endif
102
103/* RFC6091/RFC7250 */
104#ifndef TLSEXT_TYPE_client_certificate_type
105#define TLSEXT_TYPE_client_certificate_type 19
106#endif
107#ifndef TLSEXT_TYPE_server_certificate_type
108#define TLSEXT_TYPE_server_certificate_type 20
109#endif
110
111#ifndef COAP_OPENSSL_CIPHERS
112#if OPENSSL_VERSION_NUMBER >= 0x10101000L
113#define COAP_OPENSSL_CIPHERS "TLSv1.3:TLSv1.2:!NULL"
114#else /* OPENSSL_VERSION_NUMBER < 0x10101000L */
115#define COAP_OPENSSL_CIPHERS "TLSv1.2:!NULL"
116#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
117#endif /*COAP_OPENSSL_CIPHERS */
118
119#ifndef COAP_OPENSSL_PSK_CIPHERS
120#define COAP_OPENSSL_PSK_CIPHERS "PSK:!NULL"
121#endif /*COAP_OPENSSL_PSK_CIPHERS */
122
123#ifndef COAP_OPENSSL_PKCS11_ENGINE_ID
124#define COAP_OPENSSL_PKCS11_ENGINE_ID "pkcs11"
125#endif /* COAP_OPENSSL_PKCS11_ENGINE_ID */
126
127/* This structure encapsulates the OpenSSL context object. */
128typedef struct coap_dtls_context_t {
129 SSL_CTX *ctx;
130 SSL *ssl; /* OpenSSL object for listening to connection requests */
131 HMAC_CTX *cookie_hmac;
132 BIO_METHOD *meth;
133 BIO_ADDR *bio_addr;
134} coap_dtls_context_t;
135
136typedef struct coap_tls_context_t {
137 SSL_CTX *ctx;
138 BIO_METHOD *meth;
139} coap_tls_context_t;
140
141#define IS_PSK 0x1
142#define IS_PKI 0x2
143
144typedef struct sni_entry {
145 char *sni;
146#if OPENSSL_VERSION_NUMBER < 0x10101000L
147 SSL_CTX *ctx;
148#else /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
149 coap_dtls_key_t pki_key;
150#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
151} sni_entry;
152
153typedef struct psk_sni_entry {
154 char *sni;
155#if OPENSSL_VERSION_NUMBER < 0x10101000L
156 SSL_CTX *ctx;
157#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
158 coap_dtls_spsk_info_t psk_info;
159} psk_sni_entry;
160
161typedef struct coap_openssl_context_t {
162 coap_dtls_context_t dtls;
163#if !COAP_DISABLE_TCP
164 coap_tls_context_t tls;
165#endif /* !COAP_DISABLE_TCP */
166 coap_dtls_pki_t setup_data;
167 int psk_pki_enabled;
168 size_t sni_count;
169 sni_entry *sni_entry_list;
170 size_t psk_sni_count;
171 psk_sni_entry *psk_sni_entry_list;
172} coap_openssl_context_t;
173
174#if COAP_SERVER_SUPPORT
175#if OPENSSL_VERSION_NUMBER < 0x10101000L
176static int psk_tls_server_name_call_back(SSL *ssl, int *sd, void *arg);
177#else /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
178static int psk_tls_client_hello_call_back(SSL *ssl, int *al, void *arg);
179#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
180#endif /* COAP_SERVER_SUPPORT */
181
182int
184 if (SSLeay() < 0x10100000L) {
185 coap_log_warn("OpenSSL version 1.1.0 or later is required\n");
186 return 0;
187 }
188#if OPENSSL_VERSION_NUMBER >= 0x10101000L
189 /*
190 * For 1.1.1, we need to use SSL_CTX_set_client_hello_cb()
191 * which is not in 1.1.0 instead of SSL_CTX_set_tlsext_servername_callback()
192 *
193 * However, there could be a runtime undefined external reference error
194 * as SSL_CTX_set_client_hello_cb() is not there in 1.1.0.
195 */
196 if (SSLeay() < 0x10101000L) {
197 coap_log_warn("OpenSSL version 1.1.1 or later is required\n");
198 return 0;
199 }
200#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
201 return 1;
202}
203
204int
206#if !COAP_DISABLE_TCP
207 if (SSLeay() < 0x10100000L) {
208 coap_log_warn("OpenSSL version 1.1.0 or later is required\n");
209 return 0;
210 }
211#if OPENSSL_VERSION_NUMBER >= 0x10101000L
212 if (SSLeay() < 0x10101000L) {
213 coap_log_warn("OpenSSL version 1.1.1 or later is required\n");
214 return 0;
215 }
216#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
217 return 1;
218#else /* COAP_DISABLE_TCP */
219 return 0;
220#endif /* COAP_DISABLE_TCP */
221}
222
223/*
224 * return 0 failed
225 * 1 passed
226 */
227int
229 return 1;
230}
231
232/*
233 * return 0 failed
234 * 1 passed
235 */
236int
238 return 1;
239}
240
241/*
242 * return 0 failed
243 * 1 passed
244 */
245int
247 return 1;
248}
249
250/*
251 * return 0 failed
252 * 1 passed
253 */
254int
256 return 0;
257}
258
259/*
260 * return 0 failed
261 * 1 passed
262 */
263int
265 return 0;
266}
267
268#if COAP_CLIENT_SUPPORT
269int
270coap_dtls_set_cid_tuple_change(coap_context_t *c_context, uint8_t every) {
271 (void)c_context;
272 (void)every;
273 return 0;
274}
275#endif /* COAP_CLIENT_SUPPORT */
276
279 static coap_tls_version_t version;
280 version.version = SSLeay();
281 version.built_version = OPENSSL_VERSION_NUMBER;
283 return &version;
284}
285
286static ENGINE *pkcs11_engine = NULL;
287static ENGINE *defined_engine = NULL;
288
289void
290coap_dtls_startup(void) {
291 SSL_load_error_strings();
292 SSL_library_init();
293 ENGINE_load_dynamic();
294}
295
296void
297coap_dtls_shutdown(void) {
298 if (pkcs11_engine) {
299 /* Release the functional reference from ENGINE_init() */
300 ENGINE_finish(pkcs11_engine);
301 pkcs11_engine = NULL;
302 }
303 if (defined_engine) {
304 /* Release the functional reference from ENGINE_init() */
305 ENGINE_finish(defined_engine);
306 defined_engine = NULL;
307 }
308 ERR_free_strings();
310}
311
312void *
313coap_dtls_get_tls(const coap_session_t *c_session,
314 coap_tls_library_t *tls_lib) {
315 if (tls_lib)
316 *tls_lib = COAP_TLS_LIBRARY_OPENSSL;
317 if (c_session) {
318 return c_session->tls;
319 }
320 return NULL;
321}
322
323static int
324get_split_conf_entry(const uint8_t **start, size_t size, const char *get_keyword,
326 const uint8_t *begin = *start;
327 const uint8_t *end;
328 const uint8_t *kend;
329 const uint8_t *split;
330
331 *p1 = NULL;
332 *p2 = NULL;
333
334retry:
335 kend = end = memchr(begin, '\n', size);
336 if (end == NULL)
337 return 0;
338
339 /* Track beginning of next line */
340 *start = end + 1;
341 if (end > begin && end[-1] == '\r')
342 end--;
343
344 if (begin[0] == '#' || (end - begin) == 0) {
345 /* Skip comment / blank line */
346 size -= kend - begin + 1;
347 begin = *start;
348 goto retry;
349 }
350
351 /* Get in the keyword */
352 split = memchr(begin, ':', end - begin);
353 if (split == NULL)
354 goto bad_entry;
355
356 if ((size_t)(split - begin) != strlen(get_keyword)) {
357 size -= kend - begin + 1;
358 begin = *start;
359 goto retry;
360 }
361 if (memcmp(begin, get_keyword, split - begin)) {
362 size -= kend - begin + 1;
363 begin = *start;
364 goto retry;
365 }
366 /* Found entry we are looking for */
367 begin = split + 1;
368
369 /* parameter 1 is mandatory */
370 if ((end - begin) == 0)
371 goto bad_entry;
372 /* Get in paramater #1 */
373 split = memchr(begin, ':', end - begin);
374 if (split == NULL) {
375 /* Single entry - no parameter #2 */
376 *p1 = coap_new_str_const(begin, end - begin);
377 if (!(*p1)) {
378 goto bad_entry;
379 }
380 } else {
381 *p1 = coap_new_str_const(begin, split - begin);
382 if (!(*p1)) {
383 goto bad_entry;
384 }
385 if ((end - split) > 0) {
386 *p2 = coap_new_str_const(split + 1, end - split - 1);
387 if (!(*p2)) {
388 goto bad_entry;
389 }
390 }
391 }
392
393 return 1;
394
395bad_entry:
398 return 0;
399}
400
401/*
402 * Formating of OpenSSL Engine configuration is:-
403 * (Must be in this order)
404 *
405 * engine:XXX
406 * pre-cmd:XXX:YYY
407 * ....
408 * pre-cmd:XXX:YYY
409 * post-cmd:XXX:YYY
410 * ....
411 * post-cmd:XXX:YYY
412 * enable-methods:unsigned-int
413 * OR'd set of ENGINE_METHOD_* or ENGINE_METHOD_ALL
414 *
415 * pre-cmd and post-cmd are optional
416 * YYY does not have to be defined for some pre-cmd or post-cmd
417 */
418int
420 const uint8_t *start;
421 const uint8_t *end;
422 coap_str_const_t *p1 = NULL;
423 coap_str_const_t *p2 = NULL;
424 coap_str_const_t *engine_id = NULL;
425 unsigned int defaults = 0;
426 int done_engine_id = 0;
427 int done_engine_init = 0;
428
429 if (!conf_mem)
430 return 0;
431
432 start = conf_mem->s;
433 end = start + conf_mem->length;
434
435 if (defined_engine) {
436 coap_log_warn("coap_tls_engine_configure: Freeing off previous engine definition\n");
437 ENGINE_finish(defined_engine);
438 defined_engine = NULL;
439 }
440
441 /* Set up engine */
442 if (!get_split_conf_entry(&start, end - start, "engine", &engine_id, &p2)) {
443 coap_log_warn("coap_tls_engine_configure: engine not defined\n");
444 return 0;
445 }
446 defined_engine = ENGINE_by_id((const char *)engine_id->s);
447 if (!defined_engine) {
448 coap_log_warn("coap_tls_engine_configure: engine '%s' not known\n", engine_id->s);
449 goto fail_cleanup;
450 } else {
451 done_engine_id = 1;
452 coap_dtls_log(COAP_LOG_DEBUG, "coap_tls_engine_configure: engine '%s' started\n", engine_id->s);
453 }
455
456 start = conf_mem->s;
457 /* process all the pre-cmd defined */
458 while (get_split_conf_entry(&start, end - start, "pre-cmd", &p1, &p2)) {
459 if (!ENGINE_ctrl_cmd_string(defined_engine, (const char *)p1->s, p2 ? (const char *)p2->s : NULL,
460 0)) {
461 coap_log_warn("coap_tls_engine_configure: engine %s pre-cmd '%s:%s' failed\n",
462 (const char *)engine_id->s,
463 (const char *)p1->s, p2 ? (const char *)p2->s : "(NULL)");
464 goto fail_cleanup;
465 } else {
466 coap_dtls_log(COAP_LOG_DEBUG, "coap_tls_engine_configure: engine '%s' pre-cmd '%s:%s' success\n",
467 engine_id->s, p1->s, p2 ? (const char *)p2->s : "(NULL)");
468 }
471 }
472
473 p1 = NULL;
474 p2 = NULL;
475 /* Start up the engine */
476 if (!ENGINE_init(defined_engine)) {
477 coap_log_warn("coap_tls_engine_configure: %s failed initialization\n", (const char *)engine_id->s);
478 goto fail_cleanup;
479 } else {
480 done_engine_init = 1;
481 coap_dtls_log(COAP_LOG_DEBUG, "coap_tls_engine_configure: %s initialized\n",
482 (const char *)engine_id->s);
483 }
484
485 start = conf_mem->s;
486 /* process all the post-cmd defined */
487 while (get_split_conf_entry(&start, end - start, "post-cmd", &p1, &p2)) {
488 if (!ENGINE_ctrl_cmd_string(defined_engine, (const char *)p1->s, p2 ? (const char *)p2->s : NULL,
489 0)) {
490 coap_log_warn("coap_tls_engine_configure: %s post-cmd '%s:%s' failed\n", (const char *)engine_id->s,
491 (const char *)p1->s, p2 ? (const char *)p2->s : "(NULL)");
492 goto fail_cleanup;
493 } else {
494 coap_dtls_log(COAP_LOG_DEBUG, "coap_tls_engine_configure: %s post-cmd '%s:%s' success\n",
495 (const char *)engine_id->s,
496 (const char *)p1->s, p2 ? (const char *)p2->s : "(NULL)");
497 }
500 }
501
502 start = conf_mem->s;
503 /* See what we should be setting as the methods */
504 if (!get_split_conf_entry(&start, end - start, "enable-methods", &p1, &p2)) {
505 coap_log_warn("coap_tls_engine_configure: enable-methods not found\n");
506 goto fail_cleanup;
507 }
508 defaults = strtoul((const char *)p1->s, NULL, 0);
509 if (!ENGINE_set_default(defined_engine, defaults)) {
510 coap_log_warn("coap_tls_engine_configure: enable-methods 0x%x invalid\n", defaults);
511 goto fail_cleanup;
512 } else {
513 coap_dtls_log(COAP_LOG_DEBUG, "coap_tls_engine_configure: enable-methods 0x%x successful\n",
514 defaults);
515 }
516 coap_delete_str_const(engine_id);
519 /* Success */
520
521 return 1;
522
523fail_cleanup:
524 if (done_engine_id)
525 ENGINE_free(defined_engine);
526 if (done_engine_init)
527 ENGINE_finish(defined_engine);
528 defined_engine = NULL;
529 coap_delete_str_const(engine_id);
532 return 0;
533}
534
535int
537 if (defined_engine) {
538 ENGINE_finish(defined_engine);
539 defined_engine = NULL;
540 return 1;
541 }
542 return 0;
543}
544
545/*
546 * Logging levels use the standard CoAP logging levels
547 */
549
550void
552 dtls_log_level = level;
553}
554
557 return dtls_log_level;
558}
559
560typedef struct coap_ssl_st {
561 coap_session_t *session;
562 const void *pdu;
563 unsigned pdu_len;
564 unsigned peekmode;
565 coap_tick_t timeout;
566} coap_ssl_data;
567
568static int
569coap_dgram_create(BIO *a) {
570 coap_ssl_data *data = NULL;
571 data = malloc(sizeof(coap_ssl_data));
572 if (data == NULL)
573 return 0;
574 BIO_set_init(a, 1);
575 BIO_set_data(a, data);
576 memset(data, 0x00, sizeof(coap_ssl_data));
577 return 1;
578}
579
580static int
581coap_dgram_destroy(BIO *a) {
582 coap_ssl_data *data;
583 if (a == NULL)
584 return 0;
585 data = (coap_ssl_data *)BIO_get_data(a);
586 if (data != NULL)
587 free(data);
588 return 1;
589}
590
591static int
592coap_dgram_read(BIO *a, char *out, int outl) {
593 int ret = 0;
594 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(a);
595
596 if (out != NULL) {
597 if (data != NULL && data->pdu_len > 0) {
598 if (outl < (int)data->pdu_len) {
599 memcpy(out, data->pdu, outl);
600 ret = outl;
601 } else {
602 memcpy(out, data->pdu, data->pdu_len);
603 ret = (int)data->pdu_len;
604 }
605 if (!data->peekmode) {
606 data->pdu_len = 0;
607 data->pdu = NULL;
608 }
609 } else {
610 ret = -1;
611 }
612 BIO_clear_retry_flags(a);
613 if (ret < 0)
614 BIO_set_retry_read(a);
615 }
616 return ret;
617}
618
619static int
620coap_dgram_write(BIO *a, const char *in, int inl) {
621 int ret = 0;
622 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(a);
623
624 if (data->session) {
625 if (!coap_netif_available(data->session)
626#if COAP_SERVER_SUPPORT
627 && data->session->endpoint == NULL
628#endif /* COAP_SERVER_SUPPORT */
629 ) {
630 /* socket was closed on client due to error */
631 BIO_clear_retry_flags(a);
632 errno = ECONNRESET;
633 return -1;
634 }
635 ret = (int)data->session->sock.lfunc[COAP_LAYER_TLS].l_write(data->session,
636 (const uint8_t *)in,
637 inl);
638 BIO_clear_retry_flags(a);
639 if (ret <= 0)
640 BIO_set_retry_write(a);
641 } else {
642 BIO_clear_retry_flags(a);
643 ret = -1;
644 }
645 return ret;
646}
647
648static int
649coap_dgram_puts(BIO *a, const char *pstr) {
650 return coap_dgram_write(a, pstr, (int)strlen(pstr));
651}
652
653static long
654coap_dgram_ctrl(BIO *a, int cmd, long num, void *ptr) {
655 long ret = 1;
656 coap_ssl_data *data = BIO_get_data(a);
657
658 (void)ptr;
659
660 switch (cmd) {
661 case BIO_CTRL_GET_CLOSE:
662 ret = BIO_get_shutdown(a);
663 break;
664 case BIO_CTRL_SET_CLOSE:
665 BIO_set_shutdown(a, (int)num);
666 ret = 1;
667 break;
668 case BIO_CTRL_DGRAM_SET_PEEK_MODE:
669 data->peekmode = (unsigned)num;
670 break;
671 case BIO_CTRL_DGRAM_CONNECT:
672 case BIO_C_SET_FD:
673 case BIO_C_GET_FD:
674 case BIO_CTRL_DGRAM_SET_DONT_FRAG:
675 case BIO_CTRL_DGRAM_GET_MTU:
676 case BIO_CTRL_DGRAM_SET_MTU:
677 case BIO_CTRL_DGRAM_QUERY_MTU:
678 case BIO_CTRL_DGRAM_GET_FALLBACK_MTU:
679 ret = -1;
680 break;
681 case BIO_CTRL_DUP:
682 case BIO_CTRL_FLUSH:
683 case BIO_CTRL_DGRAM_MTU_DISCOVER:
684 case BIO_CTRL_DGRAM_SET_CONNECTED:
685 ret = 1;
686 break;
687 case BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT:
688 data->timeout = coap_ticks_from_rt_us((uint64_t)((struct timeval *)ptr)->tv_sec * 1000000 + ((
689 struct timeval *)ptr)->tv_usec);
690 ret = 1;
691 break;
692 case BIO_CTRL_RESET:
693 case BIO_C_FILE_SEEK:
694 case BIO_C_FILE_TELL:
695 case BIO_CTRL_INFO:
696 case BIO_CTRL_PENDING:
697 case BIO_CTRL_WPENDING:
698 case BIO_CTRL_DGRAM_GET_PEER:
699 case BIO_CTRL_DGRAM_SET_PEER:
700 case BIO_CTRL_DGRAM_SET_RECV_TIMEOUT:
701 case BIO_CTRL_DGRAM_GET_RECV_TIMEOUT:
702 case BIO_CTRL_DGRAM_SET_SEND_TIMEOUT:
703 case BIO_CTRL_DGRAM_GET_SEND_TIMEOUT:
704 case BIO_CTRL_DGRAM_GET_SEND_TIMER_EXP:
705 case BIO_CTRL_DGRAM_GET_RECV_TIMER_EXP:
706 case BIO_CTRL_DGRAM_MTU_EXCEEDED:
707 case BIO_CTRL_DGRAM_GET_MTU_OVERHEAD:
708 default:
709 ret = 0;
710 break;
711 }
712 return ret;
713}
714
715static int
716coap_dtls_generate_cookie(SSL *ssl,
717 unsigned char *cookie,
718 unsigned int *cookie_len) {
719 coap_dtls_context_t *dtls =
720 (coap_dtls_context_t *)SSL_CTX_get_app_data(SSL_get_SSL_CTX(ssl));
721 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
722 int r = HMAC_Init_ex(dtls->cookie_hmac, NULL, 0, NULL, NULL);
723 r &= HMAC_Update(dtls->cookie_hmac,
724 (const uint8_t *)&data->session->addr_info.local.addr,
725 (size_t)data->session->addr_info.local.size);
726 r &= HMAC_Update(dtls->cookie_hmac,
727 (const uint8_t *)&data->session->addr_info.remote.addr,
728 (size_t)data->session->addr_info.remote.size);
729 r &= HMAC_Final(dtls->cookie_hmac, cookie, cookie_len);
730 return r;
731}
732
733static int
734coap_dtls_verify_cookie(SSL *ssl,
735 const uint8_t *cookie,
736 unsigned int cookie_len) {
737 uint8_t hmac[32];
738 unsigned len = 32;
739 if (coap_dtls_generate_cookie(ssl, hmac, &len) &&
740 cookie_len == len && memcmp(cookie, hmac, len) == 0)
741 return 1;
742 else
743 return 0;
744}
745
746#if COAP_CLIENT_SUPPORT
747static unsigned int
748coap_dtls_psk_client_callback(SSL *ssl,
749 const char *hint,
750 char *identity,
751 unsigned int max_identity_len,
752 unsigned char *psk,
753 unsigned int max_psk_len) {
754 coap_session_t *c_session;
755 coap_openssl_context_t *o_context;
756 coap_dtls_cpsk_t *setup_data;
757 coap_bin_const_t temp;
758 const coap_dtls_cpsk_info_t *cpsk_info;
759 const coap_bin_const_t *psk_key;
760 const coap_bin_const_t *psk_identity;
761
762 c_session = (coap_session_t *)SSL_get_app_data(ssl);
763 if (c_session == NULL)
764 return 0;
765 o_context = (coap_openssl_context_t *)c_session->context->dtls_context;
766 if (o_context == NULL)
767 return 0;
768 setup_data = &c_session->cpsk_setup_data;
769
770 temp.s = hint ? (const uint8_t *)hint : (const uint8_t *)"";
771 temp.length = strlen((const char *)temp.s);
772 coap_session_refresh_psk_hint(c_session, &temp);
773
774 coap_log_debug("got psk_identity_hint: '%.*s'\n", (int)temp.length,
775 (const char *)temp.s);
776
777 if (setup_data->validate_ih_call_back) {
778 coap_str_const_t lhint;
779
780 lhint.s = temp.s;
781 lhint.length = temp.length;
782 coap_lock_callback_ret(cpsk_info, c_session->context,
783 setup_data->validate_ih_call_back(&lhint,
784 c_session,
785 setup_data->ih_call_back_arg));
786
787 if (cpsk_info == NULL)
788 return 0;
789
790 coap_session_refresh_psk_identity(c_session, &cpsk_info->identity);
791 coap_session_refresh_psk_key(c_session, &cpsk_info->key);
792 psk_identity = &cpsk_info->identity;
793 psk_key = &cpsk_info->key;
794 } else {
795 psk_identity = coap_get_session_client_psk_identity(c_session);
796 psk_key = coap_get_session_client_psk_key(c_session);
797 }
798
799 if (psk_identity == NULL || psk_key == NULL) {
800 coap_log_warn("no PSK available\n");
801 return 0;
802 }
803
804 /* identity has to be NULL terminated */
805 if (!max_identity_len)
806 return 0;
807 max_identity_len--;
808 if (psk_identity->length > max_identity_len) {
809 coap_log_warn("psk_identity too large, truncated to %d bytes\n",
810 max_identity_len);
811 } else {
812 /* Reduce to match */
813 max_identity_len = (unsigned int)psk_identity->length;
814 }
815 memcpy(identity, psk_identity->s, max_identity_len);
816 identity[max_identity_len] = '\000';
817
818 if (psk_key->length > max_psk_len) {
819 coap_log_warn("psk_key too large, truncated to %d bytes\n",
820 max_psk_len);
821 } else {
822 /* Reduce to match */
823 max_psk_len = (unsigned int)psk_key->length;
824 }
825 memcpy(psk, psk_key->s, max_psk_len);
826 return max_psk_len;
827}
828#endif /* COAP_CLIENT_SUPPORT */
829
830#if COAP_SERVER_SUPPORT
831static unsigned int
832coap_dtls_psk_server_callback(
833 SSL *ssl,
834 const char *identity,
835 unsigned char *psk,
836 unsigned int max_psk_len
837) {
838 coap_session_t *c_session;
839 coap_dtls_spsk_t *setup_data;
840 coap_bin_const_t lidentity;
841 const coap_bin_const_t *psk_key;
842
843 c_session = (coap_session_t *)SSL_get_app_data(ssl);
844 if (c_session == NULL)
845 return 0;
846
847 setup_data = &c_session->context->spsk_setup_data;
848
849 /* Track the Identity being used */
850 lidentity.s = identity ? (const uint8_t *)identity : (const uint8_t *)"";
851 lidentity.length = strlen((const char *)lidentity.s);
852 coap_session_refresh_psk_identity(c_session, &lidentity);
853
854 coap_log_debug("got psk_identity: '%.*s'\n",
855 (int)lidentity.length, (const char *)lidentity.s);
856
857 if (setup_data->validate_id_call_back) {
858 psk_key = setup_data->validate_id_call_back(&lidentity,
859 c_session,
860 setup_data->id_call_back_arg);
861
862 coap_session_refresh_psk_key(c_session, psk_key);
863 } else {
864 psk_key = coap_get_session_server_psk_key(c_session);
865 }
866
867 if (psk_key == NULL)
868 return 0;
869
870 if (psk_key->length > max_psk_len) {
871 coap_log_warn("psk_key too large, truncated to %d bytes\n",
872 max_psk_len);
873 } else {
874 /* Reduce to match */
875 max_psk_len = (unsigned int)psk_key->length;
876 }
877 memcpy(psk, psk_key->s, max_psk_len);
878 return max_psk_len;
879}
880#endif /* COAP_SERVER_SUPPORT */
881
882static const char *
883ssl_function_definition(unsigned long e) {
884#if OPENSSL_VERSION_NUMBER >= 0x30000000L
885 (void)e;
886 return "";
887#else /* OPENSSL_VERSION_NUMBER < 0x30000000L */
888 static char buff[80];
889
890 snprintf(buff, sizeof(buff), " at %s:%s",
891 ERR_lib_error_string(e), ERR_func_error_string(e));
892 return buff;
893#endif /* OPENSSL_VERSION_NUMBER < 0x30000000L */
894}
895
896static void
897coap_dtls_info_callback(const SSL *ssl, int where, int ret) {
898 coap_session_t *session = (coap_session_t *)SSL_get_app_data(ssl);
899 const char *pstr;
900 int w = where &~SSL_ST_MASK;
901
902 if (w & SSL_ST_CONNECT)
903 pstr = "SSL_connect";
904 else if (w & SSL_ST_ACCEPT)
905 pstr = "SSL_accept";
906 else
907 pstr = "undefined";
908
909 if (where & SSL_CB_LOOP) {
910 coap_dtls_log(COAP_LOG_DEBUG, "* %s: %s:%s\n",
911 coap_session_str(session), pstr, SSL_state_string_long(ssl));
912 } else if (where & SSL_CB_ALERT) {
913 coap_log_t log_level = COAP_LOG_INFO;
914 pstr = (where & SSL_CB_READ) ? "read" : "write";
915 if ((where & (SSL_CB_WRITE|SSL_CB_READ)) && (ret >> 8) == SSL3_AL_FATAL) {
917 if ((ret & 0xff) != SSL3_AD_CLOSE_NOTIFY)
918 log_level = COAP_LOG_WARN;
919 }
920 /* Need to let CoAP logging know why this session is dying */
921 coap_log(log_level, "* %s: SSL3 alert %s:%s:%s\n",
922 coap_session_str(session),
923 pstr,
924 SSL_alert_type_string_long(ret),
925 SSL_alert_desc_string_long(ret));
926 } else if (where & SSL_CB_EXIT) {
927 if (ret == 0) {
929 unsigned long e;
930 coap_dtls_log(COAP_LOG_WARN, "* %s: %s:failed in %s\n",
931 coap_session_str(session), pstr, SSL_state_string_long(ssl));
932 while ((e = ERR_get_error()))
933 coap_dtls_log(COAP_LOG_WARN, "* %s: %s%s\n",
934 coap_session_str(session), ERR_reason_error_string(e),
935 ssl_function_definition(e));
936 }
937 } else if (ret < 0) {
939 int err = SSL_get_error(ssl, ret);
940 if (err != SSL_ERROR_WANT_READ && err != SSL_ERROR_WANT_WRITE &&
941 err != SSL_ERROR_WANT_CONNECT && err != SSL_ERROR_WANT_ACCEPT &&
942 err != SSL_ERROR_WANT_X509_LOOKUP) {
943 long e;
944 coap_dtls_log(COAP_LOG_WARN, "* %s: %s:error in %s\n",
945 coap_session_str(session), pstr, SSL_state_string_long(ssl));
946 while ((e = ERR_get_error()))
947 coap_dtls_log(COAP_LOG_WARN, "* %s: %s%s\n",
948 coap_session_str(session), ERR_reason_error_string(e),
949 ssl_function_definition(e));
950 }
951 }
952 }
953 }
954
955 if (where == SSL_CB_HANDSHAKE_START && SSL_get_state(ssl) == TLS_ST_OK)
957}
958
959#if !COAP_DISABLE_TCP
960static int
961coap_sock_create(BIO *a) {
962 BIO_set_init(a, 1);
963 return 1;
964}
965
966static int
967coap_sock_destroy(BIO *a) {
968 (void)a;
969 return 1;
970}
971
972/*
973 * strm
974 * return +ve data amount
975 * 0 no more
976 * -1 error
977 */
978static int
979coap_sock_read(BIO *a, char *out, int outl) {
980 int ret = 0;
981 coap_session_t *session = (coap_session_t *)BIO_get_data(a);
982
983 if (out != NULL) {
984 ret =(int)session->sock.lfunc[COAP_LAYER_TLS].l_read(session, (uint8_t *)out,
985 outl);
986 /* Translate layer returns into what OpenSSL expects */
987 if (ret == 0) {
988 BIO_set_retry_read(a);
989 ret = -1;
990 } else {
991 BIO_clear_retry_flags(a);
992 }
993 }
994 return ret;
995}
996
997/*
998 * strm
999 * return +ve data amount
1000 * 0 no more
1001 * -1 error (error in errno)
1002 */
1003static int
1004coap_sock_write(BIO *a, const char *in, int inl) {
1005 int ret = 0;
1006 coap_session_t *session = (coap_session_t *)BIO_get_data(a);
1007
1008 ret = (int)session->sock.lfunc[COAP_LAYER_TLS].l_write(session,
1009 (const uint8_t *)in,
1010 inl);
1011 /* Translate layer what returns into what OpenSSL expects */
1012 BIO_clear_retry_flags(a);
1013 if (ret == 0) {
1014 BIO_set_retry_read(a);
1015 ret = -1;
1016 } else {
1017 BIO_clear_retry_flags(a);
1018 if (ret == -1) {
1019 if ((session->state == COAP_SESSION_STATE_CSM ||
1020 session->state == COAP_SESSION_STATE_HANDSHAKE) &&
1021 (errno == EPIPE || errno == ECONNRESET)) {
1022 /*
1023 * Need to handle a TCP timing window where an agent continues with
1024 * the sending of the next handshake or a CSM.
1025 * However, the peer does not like a certificate and so sends a
1026 * fatal alert and closes the TCP session.
1027 * The sending of the next handshake or CSM may get terminated because
1028 * of the closed TCP session, but there is still an outstanding alert
1029 * to be read in and reported on.
1030 * In this case, pretend that sending the info was fine so that the
1031 * alert can be read (which effectively is what happens with DTLS).
1032 */
1033 ret = inl;
1034 }
1035 }
1036 }
1037 return ret;
1038}
1039
1040static int
1041coap_sock_puts(BIO *a, const char *pstr) {
1042 return coap_sock_write(a, pstr, (int)strlen(pstr));
1043}
1044
1045static long
1046coap_sock_ctrl(BIO *a, int cmd, long num, void *ptr) {
1047 int r = 1;
1048 (void)a;
1049 (void)ptr;
1050 (void)num;
1051
1052 switch (cmd) {
1053 case BIO_C_SET_FD:
1054 case BIO_C_GET_FD:
1055 r = -1;
1056 break;
1057 case BIO_CTRL_SET_CLOSE:
1058 case BIO_CTRL_DUP:
1059 case BIO_CTRL_FLUSH:
1060 r = 1;
1061 break;
1062 default:
1063 case BIO_CTRL_GET_CLOSE:
1064 r = 0;
1065 break;
1066 }
1067 return r;
1068}
1069#endif /* !COAP_DISABLE_TCP */
1070
1071static void
1072coap_set_user_prefs(SSL_CTX *ctx) {
1073 SSL_CTX_set_cipher_list(ctx, COAP_OPENSSL_CIPHERS);
1074
1075#ifdef COAP_OPENSSL_SIGALGS
1076 SSL_CTX_set1_sigalgs_list(ctx, COAP_OPENSSL_SIGALGS);
1077 SSL_CTX_set1_client_sigalgs_list(ctx, COAP_OPENSSL_SIGALGS);
1078#endif
1079
1080#if OPENSSL_VERSION_NUMBER >= 0x10101000L && defined(COAP_OPENSSL_GROUPS)
1081 SSL_CTX_set1_groups_list(ctx, COAP_OPENSSL_GROUPS);
1082#endif
1083}
1084
1085#if COAP_DTLS_RETRANSMIT_MS != 1000
1086#if OPENSSL_VERSION_NUMBER >= 0x10101000L
1087static unsigned int
1088timer_cb(SSL *s, unsigned int timer_us) {
1089 (void)s;
1090 if (timer_us == 0)
1091 return COAP_DTLS_RETRANSMIT_MS * 1000;
1092 else
1093 return 2 * timer_us;
1094}
1095#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
1096#endif /* COAP_DTLS_RETRANSMIT_MS != 1000 */
1097
1098void *
1100 coap_openssl_context_t *context;
1101 (void)coap_context;
1102
1103 context = (coap_openssl_context_t *)coap_malloc_type(COAP_STRING, sizeof(coap_openssl_context_t));
1104 if (context) {
1105 uint8_t cookie_secret[32];
1106
1107 memset(context, 0, sizeof(coap_openssl_context_t));
1108
1109 /* Set up DTLS context */
1110 context->dtls.ctx = SSL_CTX_new(DTLS_method());
1111 if (!context->dtls.ctx)
1112 goto error;
1113 SSL_CTX_set_min_proto_version(context->dtls.ctx, DTLS1_2_VERSION);
1114 SSL_CTX_set_app_data(context->dtls.ctx, &context->dtls);
1115 SSL_CTX_set_read_ahead(context->dtls.ctx, 1);
1116 coap_set_user_prefs(context->dtls.ctx);
1117 memset(cookie_secret, 0, sizeof(cookie_secret));
1118 if (!RAND_bytes(cookie_secret, (int)sizeof(cookie_secret))) {
1120 "Insufficient entropy for random cookie generation");
1121 coap_prng_lkd(cookie_secret, sizeof(cookie_secret));
1122 }
1123 context->dtls.cookie_hmac = HMAC_CTX_new();
1124 if (!HMAC_Init_ex(context->dtls.cookie_hmac, cookie_secret, (int)sizeof(cookie_secret),
1125 EVP_sha256(), NULL))
1126 goto error;
1127 SSL_CTX_set_cookie_generate_cb(context->dtls.ctx, coap_dtls_generate_cookie);
1128 SSL_CTX_set_cookie_verify_cb(context->dtls.ctx, coap_dtls_verify_cookie);
1129 SSL_CTX_set_info_callback(context->dtls.ctx, coap_dtls_info_callback);
1130 SSL_CTX_set_options(context->dtls.ctx, SSL_OP_NO_QUERY_MTU);
1131#if OPENSSL_VERSION_NUMBER >= 0x30000000L
1132 SSL_CTX_set_options(context->dtls.ctx, SSL_OP_LEGACY_SERVER_CONNECT);
1133#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
1134 context->dtls.meth = BIO_meth_new(BIO_TYPE_DGRAM, "coapdgram");
1135 if (!context->dtls.meth)
1136 goto error;
1137 context->dtls.bio_addr = BIO_ADDR_new();
1138 if (!context->dtls.bio_addr)
1139 goto error;
1140 BIO_meth_set_write(context->dtls.meth, coap_dgram_write);
1141 BIO_meth_set_read(context->dtls.meth, coap_dgram_read);
1142 BIO_meth_set_puts(context->dtls.meth, coap_dgram_puts);
1143 BIO_meth_set_ctrl(context->dtls.meth, coap_dgram_ctrl);
1144 BIO_meth_set_create(context->dtls.meth, coap_dgram_create);
1145 BIO_meth_set_destroy(context->dtls.meth, coap_dgram_destroy);
1146
1147#if !COAP_DISABLE_TCP
1148 /* Set up TLS context */
1149 context->tls.ctx = SSL_CTX_new(TLS_method());
1150 if (!context->tls.ctx)
1151 goto error;
1152 SSL_CTX_set_app_data(context->tls.ctx, &context->tls);
1153 SSL_CTX_set_min_proto_version(context->tls.ctx, TLS1_VERSION);
1154 coap_set_user_prefs(context->tls.ctx);
1155 SSL_CTX_set_info_callback(context->tls.ctx, coap_dtls_info_callback);
1156 context->tls.meth = BIO_meth_new(BIO_TYPE_SOCKET, "coapsock");
1157 if (!context->tls.meth)
1158 goto error;
1159 BIO_meth_set_write(context->tls.meth, coap_sock_write);
1160 BIO_meth_set_read(context->tls.meth, coap_sock_read);
1161 BIO_meth_set_puts(context->tls.meth, coap_sock_puts);
1162 BIO_meth_set_ctrl(context->tls.meth, coap_sock_ctrl);
1163 BIO_meth_set_create(context->tls.meth, coap_sock_create);
1164 BIO_meth_set_destroy(context->tls.meth, coap_sock_destroy);
1165#endif /* !COAP_DISABLE_TCP */
1166 }
1167
1168 return context;
1169
1170error:
1171 coap_dtls_free_context(context);
1172 return NULL;
1173}
1174
1175#if COAP_SERVER_SUPPORT
1176int
1178 coap_dtls_spsk_t *setup_data
1179 ) {
1180 coap_openssl_context_t *o_context =
1181 ((coap_openssl_context_t *)c_context->dtls_context);
1182 BIO *bio;
1183
1184 if (!setup_data || !o_context)
1185 return 0;
1186
1187 SSL_CTX_set_psk_server_callback(o_context->dtls.ctx,
1188 coap_dtls_psk_server_callback);
1189#if !COAP_DISABLE_TCP
1190 SSL_CTX_set_psk_server_callback(o_context->tls.ctx,
1191 coap_dtls_psk_server_callback);
1192#endif /* !COAP_DISABLE_TCP */
1193 if (setup_data->psk_info.hint.s) {
1194 char hint[COAP_DTLS_HINT_LENGTH];
1195 snprintf(hint, sizeof(hint), "%.*s", (int)setup_data->psk_info.hint.length,
1196 setup_data->psk_info.hint.s);
1197 SSL_CTX_use_psk_identity_hint(o_context->dtls.ctx, hint);
1198#if !COAP_DISABLE_TCP
1199 SSL_CTX_use_psk_identity_hint(o_context->tls.ctx, hint);
1200#endif /* !COAP_DISABLE_TCP */
1201 }
1202 if (setup_data->validate_sni_call_back) {
1203#if OPENSSL_VERSION_NUMBER < 0x10101000L
1204 SSL_CTX_set_tlsext_servername_arg(o_context->dtls.ctx,
1205 &c_context->spsk_setup_data);
1206 SSL_CTX_set_tlsext_servername_callback(o_context->dtls.ctx,
1207 psk_tls_server_name_call_back);
1208#if !COAP_DISABLE_TCP
1209 SSL_CTX_set_tlsext_servername_arg(o_context->tls.ctx,
1210 &c_context->spsk_setup_data);
1211 SSL_CTX_set_tlsext_servername_callback(o_context->tls.ctx,
1212 psk_tls_server_name_call_back);
1213#endif /* !COAP_DISABLE_TCP */
1214#else /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
1215 SSL_CTX_set_client_hello_cb(o_context->dtls.ctx,
1216 psk_tls_client_hello_call_back,
1217 NULL);
1218#if !COAP_DISABLE_TCP
1219 SSL_CTX_set_client_hello_cb(o_context->tls.ctx,
1220 psk_tls_client_hello_call_back,
1221 NULL);
1222#endif /* !COAP_DISABLE_TCP */
1223#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
1224 }
1225
1226 if (!o_context->dtls.ssl) {
1227 /* This is set up to handle new incoming sessions to a server */
1228 o_context->dtls.ssl = SSL_new(o_context->dtls.ctx);
1229 if (!o_context->dtls.ssl)
1230 return 0;
1231 bio = BIO_new(o_context->dtls.meth);
1232 if (!bio) {
1233 SSL_free(o_context->dtls.ssl);
1234 o_context->dtls.ssl = NULL;
1235 return 0;
1236 }
1237 SSL_set_bio(o_context->dtls.ssl, bio, bio);
1238 SSL_set_app_data(o_context->dtls.ssl, NULL);
1239 SSL_set_options(o_context->dtls.ssl, SSL_OP_COOKIE_EXCHANGE);
1240 SSL_set_mtu(o_context->dtls.ssl, COAP_DEFAULT_MTU);
1241 }
1242 if (setup_data->ec_jpake) {
1243 coap_log_warn("OpenSSL has no EC-JPAKE support\n");
1244 }
1245 o_context->psk_pki_enabled |= IS_PSK;
1246 return 1;
1247}
1248#endif /* COAP_SERVER_SUPPORT */
1249
1250#if COAP_CLIENT_SUPPORT
1251int
1253 coap_dtls_cpsk_t *setup_data
1254 ) {
1255 coap_openssl_context_t *o_context =
1256 ((coap_openssl_context_t *)c_context->dtls_context);
1257 BIO *bio;
1258
1259 if (!setup_data || !o_context)
1260 return 0;
1261
1262 if (!o_context->dtls.ssl) {
1263 /* This is set up to handle new incoming sessions to a server */
1264 o_context->dtls.ssl = SSL_new(o_context->dtls.ctx);
1265 if (!o_context->dtls.ssl)
1266 return 0;
1267 bio = BIO_new(o_context->dtls.meth);
1268 if (!bio) {
1269 SSL_free(o_context->dtls.ssl);
1270 o_context->dtls.ssl = NULL;
1271 return 0;
1272 }
1273 SSL_set_bio(o_context->dtls.ssl, bio, bio);
1274 SSL_set_app_data(o_context->dtls.ssl, NULL);
1275 SSL_set_options(o_context->dtls.ssl, SSL_OP_COOKIE_EXCHANGE);
1276 SSL_set_mtu(o_context->dtls.ssl, COAP_DEFAULT_MTU);
1277 }
1278 if (setup_data->ec_jpake) {
1279 coap_log_warn("OpenSSL has no EC-JPAKE support\n");
1280 }
1281 if (setup_data->use_cid) {
1282 coap_log_warn("OpenSSL has no Connection-ID support\n");
1283 }
1284 o_context->psk_pki_enabled |= IS_PSK;
1285 return 1;
1286}
1287#endif /* COAP_CLIENT_SUPPORT */
1288
1289static int
1290map_key_type(int asn1_private_key_type
1291 ) {
1292 switch (asn1_private_key_type) {
1294 return EVP_PKEY_NONE;
1295 case COAP_ASN1_PKEY_RSA:
1296 return EVP_PKEY_RSA;
1298 return EVP_PKEY_RSA2;
1299 case COAP_ASN1_PKEY_DSA:
1300 return EVP_PKEY_DSA;
1302 return EVP_PKEY_DSA1;
1304 return EVP_PKEY_DSA2;
1306 return EVP_PKEY_DSA3;
1308 return EVP_PKEY_DSA4;
1309 case COAP_ASN1_PKEY_DH:
1310 return EVP_PKEY_DH;
1311 case COAP_ASN1_PKEY_DHX:
1312 return EVP_PKEY_DHX;
1313 case COAP_ASN1_PKEY_EC:
1314 return EVP_PKEY_EC;
1316 return EVP_PKEY_HMAC;
1318 return EVP_PKEY_CMAC;
1320 return EVP_PKEY_TLS1_PRF;
1322 return EVP_PKEY_HKDF;
1323 default:
1324 coap_log_warn("*** setup_pki: DTLS: Unknown Private Key type %d for ASN1\n",
1325 asn1_private_key_type);
1326 break;
1327 }
1328 return 0;
1329}
1330#if !COAP_DISABLE_TCP
1331static uint8_t coap_alpn[] = { 4, 'c', 'o', 'a', 'p' };
1332
1333#if COAP_SERVER_SUPPORT
1334static int
1335server_alpn_callback(SSL *ssl COAP_UNUSED,
1336 const unsigned char **out,
1337 unsigned char *outlen,
1338 const unsigned char *in,
1339 unsigned int inlen,
1340 void *arg COAP_UNUSED
1341 ) {
1342 unsigned char *tout = NULL;
1343 int ret;
1344 if (inlen == 0)
1345 return SSL_TLSEXT_ERR_NOACK;
1346 ret = SSL_select_next_proto(&tout,
1347 outlen,
1348 coap_alpn,
1349 sizeof(coap_alpn),
1350 in,
1351 inlen);
1352 *out = tout;
1353 return (ret != OPENSSL_NPN_NEGOTIATED) ? SSL_TLSEXT_ERR_NOACK : SSL_TLSEXT_ERR_OK;
1354}
1355#endif /* COAP_SERVER_SUPPORT */
1356#endif /* !COAP_DISABLE_TCP */
1357
1358static void
1359add_ca_to_cert_store(X509_STORE *st, X509 *x509) {
1360 long e;
1361
1362 /* Flush out existing errors */
1363 while (ERR_get_error() != 0) {
1364 }
1365
1366 if (!X509_STORE_add_cert(st, x509)) {
1367 while ((e = ERR_get_error()) != 0) {
1368 int r = ERR_GET_REASON(e);
1369 if (r != X509_R_CERT_ALREADY_IN_HASH_TABLE) {
1370 /* Not already added */
1371 coap_log_warn("***setup_pki: (D)TLS: %s%s\n",
1372 ERR_reason_error_string(e),
1373 ssl_function_definition(e));
1374 }
1375 }
1376 }
1377}
1378
1379static X509 *
1380missing_ENGINE_load_cert(ENGINE *engine, const char *cert_id) {
1381 struct {
1382 const char *cert_id;
1383 X509 *cert;
1384 } params;
1385
1386 params.cert_id = cert_id;
1387 params.cert = NULL;
1388
1389 /* There is no ENGINE_load_cert() */
1390 if (!ENGINE_ctrl_cmd(engine, "LOAD_CERT_CTRL", 0, &params, NULL, 1)) {
1391 params.cert = NULL;
1392 }
1393 return params.cert;
1394}
1395
1396static int
1397check_pkcs11_engine(void) {
1398 static int already_tried = 0;
1399
1400 if (already_tried)
1401 return 0;
1402
1403 if (!pkcs11_engine) {
1404 pkcs11_engine = ENGINE_by_id(COAP_OPENSSL_PKCS11_ENGINE_ID);
1405 if (!pkcs11_engine) {
1406 coap_log_err("*** setup_pki: (D)TLS: No PKCS11 support - need OpenSSL %s engine\n",
1407 COAP_OPENSSL_PKCS11_ENGINE_ID);
1408 already_tried = 1;
1409 return 0;
1410 }
1411 if (!ENGINE_init(pkcs11_engine)) {
1412 /* the engine couldn't initialise, release 'pkcs11_engine' */
1413 ENGINE_free(pkcs11_engine);
1414 pkcs11_engine = NULL;
1415 coap_log_err("*** setup_pki: (D)TLS: PKCS11 engine initialize failed\n");
1416 already_tried = 1;
1417 return 0;
1418 }
1419 /*
1420 * ENGINE_init() returned a functional reference, so free the structural
1421 * reference from ENGINE_by_id().
1422 */
1423 ENGINE_free(pkcs11_engine);
1424 }
1425 return 1;
1426}
1427
1428#if OPENSSL_VERSION_NUMBER < 0x10101000L && COAP_SERVER_SUPPORT
1429
1430static int
1431install_engine_public_cert_ctx(ENGINE *engine, SSL_CTX *ctx,
1432 const char *public_cert) {
1433 X509 *x509;
1434
1435 x509 = missing_ENGINE_load_cert(engine, public_cert);
1436 if (!x509) {
1437 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to load "
1438 "%s Certificate\n",
1439 public_cert,
1440 "Server");
1441 return 0;
1442 }
1443 if (!SSL_CTX_use_certificate(ctx, x509)) {
1444 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1445 "%s Certificate\n",
1446 public_cert,
1447 "Server");
1448 X509_free(x509);
1449 return 0;
1450 }
1451 X509_free(x509);
1452 return 1;
1453}
1454
1455static int
1456install_engine_private_key_ctx(ENGINE *engine, SSL_CTX *ctx,
1457 const char *private_key) {
1458 EVP_PKEY *pkey = ENGINE_load_private_key(engine,
1459 private_key,
1460 NULL, NULL);
1461
1462 if (!pkey) {
1463 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to load "
1464 "%s Private Key\n",
1465 private_key,
1466 "Server");
1467 return 0;
1468 }
1469 if (!SSL_CTX_use_PrivateKey(ctx, pkey)) {
1470 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1471 "%s Private Key\n",
1472 private_key,
1473 "Server");
1474 EVP_PKEY_free(pkey);
1475 return 0;
1476 }
1477 EVP_PKEY_free(pkey);
1478 return 1;
1479}
1480
1481static int
1482install_engine_ca_ctx(ENGINE *engine, SSL_CTX *ctx, const char *ca) {
1483 X509 *x509;
1484 X509_STORE *st;
1485
1486 x509 = missing_ENGINE_load_cert(engine,
1487 ca);
1488 if (!x509) {
1489 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to load "
1490 "%s CA Certificate\n",
1491 ca,
1492 "Server");
1493 return 0;
1494 }
1495 if (!SSL_CTX_add_client_CA(ctx, x509)) {
1496 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1497 "%s CA Certificate\n",
1498 ca,
1499 "Server");
1500 X509_free(x509);
1501 return 0;
1502 }
1503 st = SSL_CTX_get_cert_store(ctx);
1504 add_ca_to_cert_store(st, x509);
1505 X509_free(x509);
1506 return 1;
1507}
1508
1509static int
1510load_in_cas_ctx(SSL_CTX *ctx,
1511 const char *ca_file) {
1512 STACK_OF(X509_NAME) *cert_names;
1513 X509_STORE *st;
1514 BIO *in;
1515 X509 *x = NULL;
1516 char *rw_var = NULL;
1517 cert_names = SSL_load_client_CA_file(ca_file);
1518 if (cert_names != NULL)
1519 SSL_CTX_set_client_CA_list(ctx, cert_names);
1520 else {
1521 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1522 "client CA File\n",
1523 ca_file);
1524 return 0;
1525 }
1526
1527 /* Add CA to the trusted root CA store */
1528 st = SSL_CTX_get_cert_store(ctx);
1529 in = BIO_new(BIO_s_file());
1530 /* Need to do this to not get a compiler warning about const parameters */
1531 memcpy(&rw_var, &ca_file, sizeof(rw_var));
1532 if (!BIO_read_filename(in, rw_var)) {
1533 BIO_free(in);
1534 X509_free(x);
1535 return 0;
1536 }
1537
1538 for (;;) {
1539 if ((x = PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL)
1540 break;
1541 add_ca_to_cert_store(st, x);
1542 X509_free(x);
1543 }
1544 BIO_free(in);
1545 return 1;
1546}
1547
1548static int
1549setup_pki_server(SSL_CTX *ctx,
1550 const coap_dtls_pki_t *setup_data) {
1551 coap_dtls_key_t key;
1552
1553 /* Map over to the new define format to save code duplication */
1554 coap_dtls_map_key_type_to_define(setup_data, &key);
1555
1556 assert(key.key_type == COAP_PKI_KEY_DEFINE);
1557
1558 /*
1559 * Configure the Private Key
1560 */
1561 if (key.key.define.private_key.u_byte &&
1562 key.key.define.private_key.u_byte[0]) {
1563 switch (key.key.define.private_key_def) {
1564 case COAP_PKI_KEY_DEF_PEM: /* define private key */
1565 if (!(SSL_CTX_use_PrivateKey_file(ctx,
1567 SSL_FILETYPE_PEM))) {
1570 &key, COAP_DTLS_ROLE_SERVER, 0);
1571 }
1572 break;
1573 case COAP_PKI_KEY_DEF_PEM_BUF: /* define private key */
1574 if (key.key.define.private_key_len) {
1575 BIO *bp = BIO_new_mem_buf(key.key.define.private_key.u_byte,
1576 (int)key.key.define.private_key_len);
1577 EVP_PKEY *pkey = bp ? PEM_read_bio_PrivateKey(bp, NULL, 0, NULL) : NULL;
1578
1579 if (!pkey || !SSL_CTX_use_PrivateKey(ctx, pkey)) {
1580 if (bp)
1581 BIO_free(bp);
1582 if (pkey)
1583 EVP_PKEY_free(pkey);
1586 &key, COAP_DTLS_ROLE_SERVER, 0);
1587 }
1588 if (bp)
1589 BIO_free(bp);
1590 if (pkey)
1591 EVP_PKEY_free(pkey);
1592 } else {
1595 &key, COAP_DTLS_ROLE_SERVER, 0);
1596 }
1597 break;
1598 case COAP_PKI_KEY_DEF_RPK_BUF: /* define private key */
1601 &key, COAP_DTLS_ROLE_SERVER, 0);
1602 case COAP_PKI_KEY_DEF_DER: /* define private key */
1603 if (!(SSL_CTX_use_PrivateKey_file(ctx,
1605 SSL_FILETYPE_ASN1))) {
1608 &key, COAP_DTLS_ROLE_SERVER, 0);
1609 }
1610 break;
1611 case COAP_PKI_KEY_DEF_DER_BUF: /* define private key */
1612 if (key.key.define.private_key_len == 0 ||
1613 !(SSL_CTX_use_PrivateKey_ASN1(map_key_type(key.key.define.private_key_type),
1614 ctx,
1616 (long)key.key.define.private_key_len))) {
1619 &key, COAP_DTLS_ROLE_SERVER, 0);
1620 }
1621 break;
1622 case COAP_PKI_KEY_DEF_PKCS11: /* define private key */
1623 if (!check_pkcs11_engine()) {
1624 return 0;
1625 }
1626 if (key.key.define.user_pin) {
1627 /* If not set, pin-value may be held in pkcs11: URI */
1628 if (ENGINE_ctrl_cmd_string(pkcs11_engine,
1629 "PIN",
1630 key.key.define.user_pin, 0) == 0) {
1631 coap_log_warn("*** setup_pki: (D)TLS: PKCS11: %s: Unable to set pin\n",
1632 key.key.define.user_pin);
1633 return 0;
1634 }
1635 }
1636 if (!install_engine_private_key_ctx(pkcs11_engine, ctx,
1640 &key, COAP_DTLS_ROLE_SERVER, 0);
1641 }
1642 break;
1643 case COAP_PKI_KEY_DEF_ENGINE: /* define private key */
1644 if (!defined_engine ||
1645 !install_engine_private_key_ctx(defined_engine, ctx,
1649 &key, COAP_DTLS_ROLE_SERVER, 0);
1650 }
1651 break;
1652 case COAP_PKI_KEY_DEF_PKCS11_RPK: /* define private key */
1653 default:
1656 &key, COAP_DTLS_ROLE_SERVER, 0);
1657 }
1658 } else if (key.key.define.public_cert.u_byte && key.key.define.public_cert.u_byte[0]) {
1661 &key, COAP_DTLS_ROLE_SERVER, 0);
1662 }
1663
1664 /*
1665 * Configure the Public Certificate / Key
1666 * OpenSSL < 1.1.1 and Server
1667 */
1668 if (key.key.define.public_cert.u_byte &&
1669 key.key.define.public_cert.u_byte[0]) {
1670 switch (key.key.define.public_cert_def) {
1671 case COAP_PKI_KEY_DEF_PEM: /* define public cert */
1672 if (key.key.define.public_cert.u_byte &&
1673 key.key.define.public_cert.u_byte[0]) {
1674 if (!(SSL_use_certificate_file(ssl,
1676 SSL_FILETYPE_PEM))) {
1679 &key, role, 0);
1680 }
1681 } else {
1682 if (!SSL_use_certificate_chain_file(ssl,
1686 &key, role, 0);
1687 }
1688 }
1689 break;
1690 case COAP_PKI_KEY_DEF_PEM_BUF: /* define public cert */
1691 if (key.key.define.public_cert_len) {
1692 BIO *bp = BIO_new_mem_buf(key.key.define.public_cert.u_byte,
1693 (int)key.key.define.public_cert_len);
1694 X509 *cert = bp ? PEM_read_bio_X509(bp, NULL, 0, NULL) : NULL;
1695
1696 if (!cert || !SSL_CTX_use_certificate(ctx, cert)) {
1697 if (bp)
1698 BIO_free(bp);
1699 if (cert)
1700 X509_free(cert);
1703 &key, COAP_DTLS_ROLE_SERVER, 0);
1704 }
1705 if (bp)
1706 BIO_free(bp);
1707 if (cert)
1708 X509_free(cert);
1709 } else {
1712 &key, COAP_DTLS_ROLE_SERVER, 0);
1713 }
1714 break;
1715 case COAP_PKI_KEY_DEF_RPK_BUF: /* define public cert */
1718 &key, COAP_DTLS_ROLE_SERVER, 0);
1719 case COAP_PKI_KEY_DEF_DER: /* define public cert */
1720 if (!(SSL_CTX_use_certificate_file(ctx,
1722 SSL_FILETYPE_ASN1))) {
1725 &key, COAP_DTLS_ROLE_SERVER, 0);
1726 }
1727 break;
1728 case COAP_PKI_KEY_DEF_DER_BUF: /* define public cert */
1729 if (key.key.define.public_cert_len == 0 ||
1730 !(SSL_CTX_use_certificate_ASN1(ctx,
1731 (int)key.key.define.public_cert_len,
1732 key.key.define.public_cert.u_byte))) {
1735 &key, COAP_DTLS_ROLE_SERVER, 0);
1736 }
1737 break;
1738 case COAP_PKI_KEY_DEF_PKCS11: /* define public cert */
1739 if (!check_pkcs11_engine()) {
1740 return 0;
1741 }
1742 if (!install_engine_public_cert_ctx(pkcs11_engine, ctx,
1746 &key, COAP_DTLS_ROLE_SERVER, 0);
1747 }
1748 break;
1749 case COAP_PKI_KEY_DEF_ENGINE: /* define public cert */
1750 if (!defined_engine ||
1751 !install_engine_public_cert_ctx(defined_engine, ctx,
1755 &key, COAP_DTLS_ROLE_SERVER, 0);
1756 }
1757 break;
1758 case COAP_PKI_KEY_DEF_PKCS11_RPK: /* define public cert */
1759 default:
1762 &key, COAP_DTLS_ROLE_SERVER, 0);
1763 }
1764 } else if (key.key.define.private_key.u_byte &&
1765 key.key.define.private_key.u_byte[0]) {
1768 &key, COAP_DTLS_ROLE_SERVER, 0);
1769 }
1770
1771 /*
1772 * Configure the CA
1773 */
1774 if (key.key.define.ca.u_byte &&
1775 key.key.define.ca.u_byte[0]) {
1776 switch (key.key.define.ca_def) {
1778 if (!load_in_cas_ctx(ctx, key.key.define.ca.s_byte)) {
1781 &key, COAP_DTLS_ROLE_SERVER, 0);
1782 }
1783 break;
1784 case COAP_PKI_KEY_DEF_PEM_BUF: /* define ca */
1785 if (key.key.define.ca_len) {
1786 BIO *bp = BIO_new_mem_buf(key.key.define.ca.s_byte,
1787 (int)key.key.define.ca_len);
1788 X509 *x;
1789 X509_STORE *st = SSL_CTX_get_cert_store(ctx);
1790
1791 if (bp) {
1792 for (;;) {
1793 if ((x = PEM_read_bio_X509(bp, NULL, NULL, NULL)) == NULL)
1794 break;
1795 add_ca_to_cert_store(st, x);
1796 SSL_CTX_add_client_CA(ctx, x);
1797 X509_free(x);
1798 }
1799 BIO_free(bp);
1800 }
1801 } else {
1804 &key, COAP_DTLS_ROLE_SERVER, 0);
1805 }
1806 break;
1807 case COAP_PKI_KEY_DEF_RPK_BUF: /* define ca */
1810 &key, COAP_DTLS_ROLE_SERVER, 0);
1811 case COAP_PKI_KEY_DEF_DER: /* define ca */
1812 if (!(SSL_CTX_use_certificate_file(ctx,
1813 key.key.define.ca.s_byte,
1814 SSL_FILETYPE_ASN1))) {
1817 &key, COAP_DTLS_ROLE_SERVER, 0);
1818 }
1819 break;
1820 case COAP_PKI_KEY_DEF_DER_BUF: /* define ca */
1821 if (key.key.define.ca_len > 0) {
1822 /* Need to use a temp variable as it gets incremented*/
1823 const uint8_t *p = key.key.define.ca.u_byte;
1824 X509 *x509 = d2i_X509(NULL, &p, (long)key.key.define.ca_len);
1825 X509_STORE *st;
1826
1827 if (!x509 || !SSL_CTX_add_client_CA(ctx, x509)) {
1828 X509_free(x509);
1831 &key, COAP_DTLS_ROLE_SERVER, 0);
1832 }
1833
1834 /* Add CA to the trusted root CA store */
1835 st = SSL_CTX_get_cert_store(ctx);
1836 add_ca_to_cert_store(st, x509);
1837 X509_free(x509);
1838 }
1839 break;
1840 case COAP_PKI_KEY_DEF_PKCS11: /* define ca */
1841 if (!check_pkcs11_engine()) {
1842 return 0;
1843 }
1844 if (!install_engine_ca_ctx(pkcs11_engine, ctx,
1845 key.key.define.ca.s_byte)) {
1848 &key, COAP_DTLS_ROLE_SERVER, 0);
1849 }
1850 break;
1851 case COAP_PKI_KEY_DEF_ENGINE: /* define ca */
1852 if (!defined_engine ||
1853 !install_engine_ca_ctx(defined_engine, ctx,
1854 key.key.define.ca.s_byte)) {
1857 &key, COAP_DTLS_ROLE_SERVER, 0);
1858 }
1859 break;
1860 case COAP_PKI_KEY_DEF_PKCS11_RPK: /* define ca */
1861 default:
1864 &key, COAP_DTLS_ROLE_SERVER, 0);
1865 }
1866 }
1867
1868 return 1;
1869}
1870#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
1871
1872#if OPENSSL_VERSION_NUMBER >= 0x10101000L || COAP_CLIENT_SUPPORT
1873
1874static int
1875install_engine_public_cert(ENGINE *engine, SSL *ssl, const char *public_cert,
1876 coap_dtls_role_t role) {
1877 X509 *x509;
1878
1879 x509 = missing_ENGINE_load_cert(engine, public_cert);
1880 if (!x509) {
1881 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to load "
1882 "%s Certificate\n",
1883 public_cert,
1884 role == COAP_DTLS_ROLE_SERVER ? "Server" : "Client");
1885 return 0;
1886 }
1887 if (!SSL_use_certificate(ssl, x509)) {
1888 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1889 "%s Certificate\n",
1890 public_cert,
1891 role == COAP_DTLS_ROLE_SERVER ? "Server" : "Client");
1892 X509_free(x509);
1893 return 0;
1894 }
1895 X509_free(x509);
1896 return 1;
1897}
1898
1899static int
1900install_engine_private_key(ENGINE *engine, SSL *ssl, const char *private_key,
1901 coap_dtls_role_t role) {
1902 EVP_PKEY *pkey = ENGINE_load_private_key(engine,
1903 private_key,
1904 NULL, NULL);
1905
1906 if (!pkey) {
1907 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to load "
1908 "%s Private Key\n",
1909 private_key,
1910 role == COAP_DTLS_ROLE_SERVER ? "Server" : "Client");
1911 return 0;
1912 }
1913 if (!SSL_use_PrivateKey(ssl, pkey)) {
1914 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1915 "%s Private Key\n",
1916 private_key,
1917 role == COAP_DTLS_ROLE_SERVER ? "Server" : "Client");
1918 EVP_PKEY_free(pkey);
1919 return 0;
1920 }
1921 EVP_PKEY_free(pkey);
1922 return 1;
1923}
1924
1925static int
1926install_engine_ca(ENGINE *engine, SSL *ssl, const char *ca,
1927 coap_dtls_role_t role) {
1928 X509 *x509;
1929 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
1930 X509_STORE *st;
1931
1932 x509 = missing_ENGINE_load_cert(engine,
1933 ca);
1934 if (!x509) {
1935 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to load "
1936 "%s CA Certificate\n",
1937 ca,
1938 role == COAP_DTLS_ROLE_SERVER ? "Server" : "Client");
1939 return 0;
1940 }
1941 if (!SSL_add_client_CA(ssl, x509)) {
1942 coap_log_warn("*** setup_pki: (D)TLS: %s: Unable to configure "
1943 "%s CA Certificate\n",
1944 ca,
1945 role == COAP_DTLS_ROLE_SERVER ? "Server" : "Client");
1946 X509_free(x509);
1947 return 0;
1948 }
1949 st = SSL_CTX_get_cert_store(ctx);
1950 add_ca_to_cert_store(st, x509);
1951 X509_free(x509);
1952 return 1;
1953}
1954
1955static int
1956load_in_cas(SSL *ssl,
1957 const char *ca_file, coap_dtls_role_t role) {
1958 X509_STORE *st;
1959 BIO *in;
1960 X509 *x = NULL;
1961 char *rw_var = NULL;
1962 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
1963
1964 if (role == COAP_DTLS_ROLE_SERVER) {
1965 STACK_OF(X509_NAME) *cert_names = SSL_load_client_CA_file(ca_file);
1966
1967 if (cert_names != NULL)
1968 SSL_set_client_CA_list(ssl, cert_names);
1969 else {
1970 return 0;
1971 }
1972 }
1973
1974 /* Add CA to the trusted root CA store */
1975 in = BIO_new(BIO_s_file());
1976 /* Need to do this to not get a compiler warning about const parameters */
1977 memcpy(&rw_var, &ca_file, sizeof(rw_var));
1978 if (!BIO_read_filename(in, rw_var)) {
1979 BIO_free(in);
1980 return 0;
1981 }
1982 st = SSL_CTX_get_cert_store(ctx);
1983 for (;;) {
1984 if ((x = PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL)
1985 break;
1986 add_ca_to_cert_store(st, x);
1987 X509_free(x);
1988 }
1989 BIO_free(in);
1990 return 1;
1991}
1992
1993static int
1994setup_pki_ssl(SSL *ssl,
1995 coap_dtls_pki_t *setup_data, coap_dtls_role_t role) {
1996 coap_dtls_key_t key;
1997
1998 /* Map over to the new define format to save code duplication */
1999 coap_dtls_map_key_type_to_define(setup_data, &key);
2000
2001 assert(key.key_type == COAP_PKI_KEY_DEFINE);
2002
2003 /*
2004 * Configure the Private Key
2005 */
2006 if (key.key.define.private_key.u_byte &&
2007 key.key.define.private_key.u_byte[0]) {
2008 switch (key.key.define.private_key_def) {
2009 case COAP_PKI_KEY_DEF_PEM: /* define private key */
2010 if (!(SSL_use_PrivateKey_file(ssl,
2012 SSL_FILETYPE_PEM))) {
2015 &key, role, 0);
2016 }
2017 break;
2018 case COAP_PKI_KEY_DEF_PEM_BUF: /* define private key */
2019 if (key.key.define.private_key_len) {
2020 BIO *bp = BIO_new_mem_buf(key.key.define.private_key.u_byte,
2021 (int)key.key.define.private_key_len);
2022 EVP_PKEY *pkey = bp ? PEM_read_bio_PrivateKey(bp, NULL, 0, NULL) : NULL;
2023
2024 if (!pkey || !SSL_use_PrivateKey(ssl, pkey)) {
2025 if (bp)
2026 BIO_free(bp);
2027 if (pkey)
2028 EVP_PKEY_free(pkey);
2031 &key, role, 0);
2032 }
2033 if (bp)
2034 BIO_free(bp);
2035 if (pkey)
2036 EVP_PKEY_free(pkey);
2037 } else {
2040 &key, role, 0);
2041 }
2042 break;
2043 case COAP_PKI_KEY_DEF_RPK_BUF: /* define private key */
2046 &key, role, 0);
2047 case COAP_PKI_KEY_DEF_DER: /* define private key */
2048 if (!(SSL_use_PrivateKey_file(ssl,
2050 SSL_FILETYPE_ASN1))) {
2053 &key, role, 0);
2054 }
2055 break;
2056 case COAP_PKI_KEY_DEF_DER_BUF: /* define private key */
2057 if (key.key.define.private_key_len == 0 ||
2058 !(SSL_use_PrivateKey_ASN1(map_key_type(key.key.define.private_key_type),
2059 ssl,
2061 (long)key.key.define.private_key_len))) {
2064 &key, role, 0);
2065 }
2066 break;
2067 case COAP_PKI_KEY_DEF_PKCS11: /* define private key */
2068 if (!check_pkcs11_engine()) {
2069 return 0;
2070 }
2071 if (key.key.define.user_pin) {
2072 /* If not set, pin-value may be held in pkcs11: URI */
2073 if (ENGINE_ctrl_cmd_string(pkcs11_engine,
2074 "PIN",
2075 key.key.define.user_pin, 0) == 0) {
2076 coap_log_warn("*** setup_pki: (D)TLS: PKCS11: %s: Unable to set pin\n",
2077 key.key.define.user_pin);
2078 return 0;
2079 }
2080 }
2081 if (!install_engine_private_key(pkcs11_engine, ssl,
2083 role)) {
2086 &key, role, 0);
2087 }
2088 break;
2089 case COAP_PKI_KEY_DEF_ENGINE: /* define private key */
2090 if (!defined_engine ||
2091 !install_engine_private_key(defined_engine, ssl,
2093 role)) {
2096 &key, role, 0);
2097 }
2098 break;
2099 case COAP_PKI_KEY_DEF_PKCS11_RPK: /* define private key */
2100 default:
2103 &key, role, 0);
2104 }
2105 } else if (role == COAP_DTLS_ROLE_SERVER ||
2107 key.key.define.public_cert.u_byte[0])) {
2110 &key, role, 0);
2111 }
2112
2113 /*
2114 * Configure the Public Certificate / Key
2115 */
2116 if (key.key.define.public_cert.u_byte &&
2117 key.key.define.public_cert.u_byte[0]) {
2118 switch (key.key.define.public_cert_def) {
2119 case COAP_PKI_KEY_DEF_PEM: /* define public cert */
2120 if (key.key.define.ca.u_byte &&
2121 key.key.define.ca.u_byte[0]) {
2122 /* If CA is separately defined */
2123 if (!(SSL_use_certificate_file(ssl,
2125 SSL_FILETYPE_PEM))) {
2128 &key, role, 0);
2129 }
2130 } else {
2131 if (!SSL_use_certificate_chain_file(ssl,
2135 &key, role, 0);
2136 }
2137 }
2138 break;
2139 case COAP_PKI_KEY_DEF_PEM_BUF: /* define public cert */
2140 if (key.key.define.public_cert_len) {
2141 BIO *bp = BIO_new_mem_buf(key.key.define.public_cert.s_byte,
2142 (int)key.key.define.public_cert_len);
2143 X509 *cert = bp ? PEM_read_bio_X509(bp, NULL, 0, NULL) : NULL;
2144
2145 if (!cert || !SSL_use_certificate(ssl, cert)) {
2146 if (bp)
2147 BIO_free(bp);
2148 if (cert)
2149 X509_free(cert);
2152 &key, role, 0);
2153 }
2154 if (bp)
2155 BIO_free(bp);
2156 if (cert)
2157 X509_free(cert);
2158 } else {
2161 &key, role, 0);
2162 }
2163 break;
2164 case COAP_PKI_KEY_DEF_RPK_BUF: /* define public cert */
2167 &key, role, 0);
2168 case COAP_PKI_KEY_DEF_DER: /* define public cert */
2169 if (!(SSL_use_certificate_file(ssl,
2171 SSL_FILETYPE_ASN1))) {
2174 &key, role, 0);
2175 }
2176 break;
2177 case COAP_PKI_KEY_DEF_DER_BUF: /* define public cert */
2178 if (key.key.define.public_cert_len == 0 ||
2179 !(SSL_use_certificate_ASN1(ssl,
2181 (int)key.key.define.public_cert_len))) {
2184 &key, role, 0);
2185 }
2186 break;
2187 case COAP_PKI_KEY_DEF_PKCS11: /* define public cert */
2188 if (!check_pkcs11_engine()) {
2189 return 0;
2190 }
2191 if (!install_engine_public_cert(pkcs11_engine, ssl,
2193 role)) {
2196 &key, role, 0);
2197 }
2198 break;
2199 case COAP_PKI_KEY_DEF_ENGINE: /* define public cert */
2200 if (!defined_engine ||
2201 !install_engine_public_cert(defined_engine, ssl,
2203 role)) {
2206 &key, role, 0);
2207 }
2208 break;
2209 case COAP_PKI_KEY_DEF_PKCS11_RPK: /* define public cert */
2210 default:
2213 &key, role, 0);
2214 }
2215 } else if (role == COAP_DTLS_ROLE_SERVER ||
2217 key.key.define.private_key.u_byte[0])) {
2220 &key, role, 0);
2221 }
2222
2223 /*
2224 * Configure the CA
2225 */
2226 if (key.key.define.ca.u_byte &&
2227 key.key.define.ca.u_byte[0]) {
2228 switch (key.key.define.ca_def) {
2230 if (!load_in_cas(ssl, key.key.define.ca.s_byte, role)) {
2233 &key, role, 0);
2234 }
2235 break;
2236 case COAP_PKI_KEY_DEF_PEM_BUF: /* define ca */
2237 if (key.key.define.ca_len) {
2238 BIO *bp = BIO_new_mem_buf(key.key.define.ca.u_byte,
2239 (int)key.key.define.ca_len);
2240 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
2241 X509 *x;
2242 X509_STORE *st = SSL_CTX_get_cert_store(ctx);
2243
2244 if (bp) {
2245 for (;;) {
2246 if ((x = PEM_read_bio_X509(bp, NULL, 0, NULL)) == NULL)
2247 break;
2248 add_ca_to_cert_store(st, x);
2249 SSL_add_client_CA(ssl, x);
2250 X509_free(x);
2251 }
2252 BIO_free(bp);
2253 }
2254 } else {
2257 &key, role, 0);
2258 }
2259 break;
2260 case COAP_PKI_KEY_DEF_RPK_BUF: /* define ca */
2263 &key, role, 0);
2264 case COAP_PKI_KEY_DEF_DER: /* define ca */
2265 if (!(SSL_use_certificate_file(ssl,
2266 key.key.define.ca.s_byte,
2267 SSL_FILETYPE_ASN1))) {
2270 &key, role, 0);
2271 }
2272 break;
2273 case COAP_PKI_KEY_DEF_DER_BUF: /* define ca */
2274 if (key.key.define.ca_len > 0) {
2275 /* Need to use a temp variable as it gets incremented*/
2276 const uint8_t *p = key.key.define.ca.u_byte;
2277 X509 *x509 = d2i_X509(NULL, &p, (long)key.key.define.ca_len);
2278 X509_STORE *st;
2279 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
2280
2281 if (role == COAP_DTLS_ROLE_SERVER) {
2282 if (!x509 || !SSL_add_client_CA(ssl, x509)) {
2283 X509_free(x509);
2286 &key, role, 0);
2287 }
2288 }
2289
2290 /* Add CA to the trusted root CA store */
2291 st = SSL_CTX_get_cert_store(ctx);
2292 add_ca_to_cert_store(st, x509);
2293 X509_free(x509);
2294 }
2295 break;
2296 case COAP_PKI_KEY_DEF_PKCS11: /* define ca */
2297 if (!check_pkcs11_engine()) {
2298 return 0;
2299 }
2300 if (!install_engine_ca(pkcs11_engine, ssl,
2301 key.key.define.ca.s_byte,
2302 role)) {
2305 &key, role, 0);
2306 }
2307 break;
2308 case COAP_PKI_KEY_DEF_ENGINE: /* define ca */
2309 if (!defined_engine ||
2310 !install_engine_ca(defined_engine, ssl,
2311 key.key.define.ca.s_byte,
2312 role)) {
2315 &key, role, 0);
2316 }
2317 break;
2318 case COAP_PKI_KEY_DEF_PKCS11_RPK: /* define ca */
2319 default:
2322 &key, role, 0);
2323 }
2324 }
2325
2326 return 1;
2327}
2328#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L || COAP_CLIENT_SUPPORT */
2329
2330static char *
2331get_san_or_cn_from_cert(X509 *x509) {
2332 if (x509) {
2333 char *cn;
2334 int n;
2335 STACK_OF(GENERAL_NAME) *san_list;
2336 char buffer[256];
2337
2338 san_list = X509_get_ext_d2i(x509, NID_subject_alt_name, NULL, NULL);
2339 if (san_list) {
2340 int san_count = sk_GENERAL_NAME_num(san_list);
2341
2342 for (n = 0; n < san_count; n++) {
2343 const GENERAL_NAME *name = sk_GENERAL_NAME_value(san_list, n);
2344
2345 if (name->type == GEN_DNS) {
2346 const char *dns_name = (const char *)ASN1_STRING_get0_data(name->d.dNSName);
2347
2348 /* Make sure that there is not an embedded NUL in the dns_name */
2349 if (ASN1_STRING_length(name->d.dNSName) != (int)strlen(dns_name))
2350 continue;
2351 cn = OPENSSL_strdup(dns_name);
2352 sk_GENERAL_NAME_pop_free(san_list, GENERAL_NAME_free);
2353 return cn;
2354 }
2355 }
2356 sk_GENERAL_NAME_pop_free(san_list, GENERAL_NAME_free);
2357 }
2358 /* Otherwise look for the CN= field */
2359 X509_NAME_oneline(X509_get_subject_name(x509), buffer, sizeof(buffer));
2360
2361 /* Need to emulate strcasestr() here. Looking for CN= */
2362 n = (int)strlen(buffer) - 3;
2363 cn = buffer;
2364 while (n > 0) {
2365 if (((cn[0] == 'C') || (cn[0] == 'c')) &&
2366 ((cn[1] == 'N') || (cn[1] == 'n')) &&
2367 (cn[2] == '=')) {
2368 cn += 3;
2369 break;
2370 }
2371 cn++;
2372 n--;
2373 }
2374 if (n > 0) {
2375 char *ecn = strchr(cn, '/');
2376 if (ecn) {
2377 return OPENSSL_strndup(cn, ecn-cn);
2378 } else {
2379 return OPENSSL_strdup(cn);
2380 }
2381 }
2382 }
2383 return NULL;
2384}
2385
2386static int
2387tls_verify_call_back(int preverify_ok, X509_STORE_CTX *ctx) {
2388 SSL *ssl = X509_STORE_CTX_get_ex_data(ctx,
2389 SSL_get_ex_data_X509_STORE_CTX_idx());
2390 coap_session_t *session = SSL_get_app_data(ssl);
2391 coap_openssl_context_t *context =
2392 ((coap_openssl_context_t *)session->context->dtls_context);
2393 coap_dtls_pki_t *setup_data = &context->setup_data;
2394 int depth = X509_STORE_CTX_get_error_depth(ctx);
2395 int err = X509_STORE_CTX_get_error(ctx);
2396 X509 *x509 = X509_STORE_CTX_get_current_cert(ctx);
2397 char *cn = get_san_or_cn_from_cert(x509);
2398 int keep_preverify_ok = preverify_ok;
2399
2400 coap_dtls_log(COAP_LOG_DEBUG, "depth %d error %x preverify %d cert '%s'\n",
2401 depth, err, preverify_ok, cn);
2402 if (!preverify_ok) {
2403 switch (err) {
2404 case X509_V_ERR_CERT_NOT_YET_VALID:
2405 case X509_V_ERR_CERT_HAS_EXPIRED:
2406 if (setup_data->allow_expired_certs)
2407 preverify_ok = 1;
2408 break;
2409 case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
2410 if (setup_data->allow_self_signed && !setup_data->check_common_ca)
2411 preverify_ok = 1;
2412 break;
2413 case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: /* Set if the CA is not known */
2414 if (!setup_data->verify_peer_cert)
2415 preverify_ok = 1;
2416 break;
2417 case X509_V_ERR_UNABLE_TO_GET_CRL:
2418 if (setup_data->allow_no_crl)
2419 preverify_ok = 1;
2420 break;
2421 case X509_V_ERR_CRL_NOT_YET_VALID:
2422 case X509_V_ERR_CRL_HAS_EXPIRED:
2423 if (setup_data->allow_expired_crl)
2424 preverify_ok = 1;
2425 break;
2426 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
2427 case X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE:
2428 case X509_V_ERR_AKID_SKID_MISMATCH:
2429 if (!setup_data->verify_peer_cert)
2430 preverify_ok = 1;
2431 break;
2432 default:
2433 break;
2434 }
2435 if (setup_data->cert_chain_validation &&
2436 depth > (setup_data->cert_chain_verify_depth + 1)) {
2437 preverify_ok = 0;
2438 err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
2439 X509_STORE_CTX_set_error(ctx, err);
2440 }
2441 if (!preverify_ok) {
2442 if (err == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN) {
2443 coap_log_warn(" %s: %s: '%s' depth=%d\n",
2444 coap_session_str(session),
2445 "Unknown CA", cn ? cn : "?", depth);
2446 } else {
2447 coap_log_warn(" %s: %s: '%s' depth=%d\n",
2448 coap_session_str(session),
2449 X509_verify_cert_error_string(err), cn ? cn : "?", depth);
2450 }
2451 } else {
2452 coap_log_info(" %s: %s: overridden: '%s' depth=%d\n",
2453 coap_session_str(session),
2454 X509_verify_cert_error_string(err), cn ? cn : "?", depth);
2455 }
2456 }
2457 /* Certificate - depth == 0 is the Client Cert */
2458 if (setup_data->validate_cn_call_back && keep_preverify_ok) {
2459 int length = i2d_X509(x509, NULL);
2460 uint8_t *base_buf;
2461 uint8_t *base_buf2 = base_buf = OPENSSL_malloc(length);
2462 int ret;
2463
2464 /* base_buf2 gets moved to the end */
2465 i2d_X509(x509, &base_buf2);
2466 coap_lock_callback_ret(ret, session->context,
2467 setup_data->validate_cn_call_back(cn, base_buf, length, session,
2468 depth, preverify_ok,
2469 setup_data->cn_call_back_arg));
2470 if (!ret) {
2471 if (depth == 0) {
2472 X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_REJECTED);
2473 } else {
2474 X509_STORE_CTX_set_error(ctx, X509_V_ERR_INVALID_CA);
2475 }
2476 preverify_ok = 0;
2477 }
2478 OPENSSL_free(base_buf);
2479 }
2480 OPENSSL_free(cn);
2481 return preverify_ok;
2482}
2483
2484#if COAP_SERVER_SUPPORT
2485#if OPENSSL_VERSION_NUMBER < 0x10101000L
2486/* OpenSSL < 1.1.1 */
2487/*
2488 * During the SSL/TLS initial negotiations, tls_secret_call_back() is called so
2489 * it is possible to determine whether this is a PKI or PSK incoming
2490 * request and adjust the ciphers if necessary
2491 *
2492 * Set up by SSL_set_session_secret_cb() in tls_server_name_call_back()
2493 */
2494static int
2495tls_secret_call_back(SSL *ssl,
2496 void *secret,
2497 int *secretlen,
2498 STACK_OF(SSL_CIPHER) *peer_ciphers,
2499 const SSL_CIPHER **cipher COAP_UNUSED,
2500 void *arg) {
2501 int ii;
2502 int psk_requested = 0;
2503 coap_session_t *session;
2504 coap_dtls_pki_t *setup_data = (coap_dtls_pki_t *)arg;
2505
2506 session = (coap_session_t *)SSL_get_app_data(ssl);
2507 assert(session != NULL);
2508 assert(session->context != NULL);
2509 if (session == NULL ||
2510 session->context == NULL)
2511 return 0;
2512
2513 if ((session->psk_key) ||
2514 (session->context->spsk_setup_data.psk_info.key.s &&
2516 /* Is PSK being requested - if so, we need to change algorithms */
2517 for (ii = 0; ii < sk_SSL_CIPHER_num(peer_ciphers); ii++) {
2518 const SSL_CIPHER *peer_cipher = sk_SSL_CIPHER_value(peer_ciphers, ii);
2519
2520 coap_dtls_log(COAP_LOG_INFO, "Client cipher: %s\n",
2521 SSL_CIPHER_get_name(peer_cipher));
2522 if (strstr(SSL_CIPHER_get_name(peer_cipher), "PSK")) {
2523 psk_requested = 1;
2524 break;
2525 }
2526 }
2527 }
2528 if (!psk_requested) {
2529 coap_log_debug(" %s: Using PKI ciphers\n",
2530 coap_session_str(session));
2531
2532 if (setup_data->verify_peer_cert) {
2533 SSL_set_verify(ssl,
2534 SSL_VERIFY_PEER |
2535 SSL_VERIFY_CLIENT_ONCE |
2536 SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2537 tls_verify_call_back);
2538 } else {
2539 SSL_set_verify(ssl, SSL_VERIFY_NONE, tls_verify_call_back);
2540 }
2541
2542 /* Check CA Chain */
2543 if (setup_data->cert_chain_validation)
2544 SSL_set_verify_depth(ssl, setup_data->cert_chain_verify_depth + 2);
2545
2546 /* Certificate Revocation */
2547 if (setup_data->check_cert_revocation) {
2548 X509_VERIFY_PARAM *param;
2549
2550 param = X509_VERIFY_PARAM_new();
2551 X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
2552 SSL_set1_param(ssl, param);
2553 X509_VERIFY_PARAM_free(param);
2554 }
2555 if (setup_data->additional_tls_setup_call_back) {
2556 /* Additional application setup wanted */
2557 if (!setup_data->additional_tls_setup_call_back(ssl, setup_data))
2558 return 0;
2559 }
2560 } else {
2561 if (session->psk_key) {
2562 memcpy(secret, session->psk_key->s, session->psk_key->length);
2563 *secretlen = session->psk_key->length;
2564 } else if (session->context->spsk_setup_data.psk_info.key.s &&
2566 memcpy(secret, session->context->spsk_setup_data.psk_info.key.s,
2568 *secretlen = session->context->spsk_setup_data.psk_info.key.length;
2569 }
2570 coap_log_debug(" %s: Setting PSK ciphers\n",
2571 coap_session_str(session));
2572 /*
2573 * Force a PSK algorithm to be used, so we do PSK
2574 */
2575 SSL_set_cipher_list(ssl, COAP_OPENSSL_PSK_CIPHERS);
2576 SSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
2577 }
2578 return 0;
2579}
2580
2581/* OpenSSL < 1.1.1 */
2582/*
2583 * During the SSL/TLS initial negotiations, tls_server_name_call_back() is
2584 * called so it is possible to set up an extra callback to determine whether
2585 * this is a PKI or PSK incoming request and adjust the ciphers if necessary
2586 *
2587 * Set up by SSL_CTX_set_tlsext_servername_callback() in
2588 * coap_dtls_context_set_pki()
2589 */
2590static int
2591tls_server_name_call_back(SSL *ssl,
2592 int *sd COAP_UNUSED,
2593 void *arg) {
2594 coap_dtls_pki_t *setup_data = (coap_dtls_pki_t *)arg;
2595
2596 if (!ssl) {
2597 return SSL_TLSEXT_ERR_NOACK;
2598 }
2599
2600 if (setup_data->validate_sni_call_back) {
2601 /* SNI checking requested */
2602 coap_session_t *session = (coap_session_t *)SSL_get_app_data(ssl);
2603 coap_openssl_context_t *context =
2604 ((coap_openssl_context_t *)session->context->dtls_context);
2605 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
2606 size_t i;
2607
2608 if (!sni || !sni[0]) {
2609 sni = "";
2610 }
2611 for (i = 0; i < context->sni_count; i++) {
2612 if (!strcasecmp(sni, context->sni_entry_list[i].sni)) {
2613 break;
2614 }
2615 }
2616 if (i == context->sni_count) {
2617 SSL_CTX *ctx;
2618 coap_dtls_pki_t sni_setup_data;
2619 coap_dtls_key_t *new_entry;
2620
2621 coap_lock_callback_ret(new_entry, session->context,
2622 setup_data->validate_sni_call_back(sni,
2623 setup_data->sni_call_back_arg));
2624 if (!new_entry) {
2625 return SSL_TLSEXT_ERR_ALERT_FATAL;
2626 }
2627 /* Need to set up a new SSL_CTX to switch to */
2628 if (session->proto == COAP_PROTO_DTLS) {
2629 /* Set up DTLS context */
2630 ctx = SSL_CTX_new(DTLS_method());
2631 if (!ctx)
2632 goto error;
2633 SSL_CTX_set_min_proto_version(ctx, DTLS1_2_VERSION);
2634 SSL_CTX_set_app_data(ctx, &context->dtls);
2635 SSL_CTX_set_read_ahead(ctx, 1);
2636 coap_set_user_prefs(ctx);
2637 SSL_CTX_set_cookie_generate_cb(ctx, coap_dtls_generate_cookie);
2638 SSL_CTX_set_cookie_verify_cb(ctx, coap_dtls_verify_cookie);
2639 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2640 SSL_CTX_set_options(ctx, SSL_OP_NO_QUERY_MTU);
2641 }
2642#if !COAP_DISABLE_TCP
2643 else {
2644 /* Set up TLS context */
2645 ctx = SSL_CTX_new(TLS_method());
2646 if (!ctx)
2647 goto error;
2648 SSL_CTX_set_app_data(ctx, &context->tls);
2649 SSL_CTX_set_min_proto_version(ctx, TLS1_VERSION);
2650 coap_set_user_prefs(ctx);
2651 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2652 SSL_CTX_set_alpn_select_cb(ctx, server_alpn_callback, NULL);
2653 }
2654#endif /* !COAP_DISABLE_TCP */
2655 sni_setup_data = *setup_data;
2656 sni_setup_data.pki_key = *new_entry;
2657 setup_pki_server(ctx, &sni_setup_data);
2658
2659 context->sni_entry_list = OPENSSL_realloc(context->sni_entry_list,
2660 (context->sni_count+1)*sizeof(sni_entry));
2661 context->sni_entry_list[context->sni_count].sni = OPENSSL_strdup(sni);
2662 context->sni_entry_list[context->sni_count].ctx = ctx;
2663 context->sni_count++;
2664 }
2665 SSL_set_SSL_CTX(ssl, context->sni_entry_list[i].ctx);
2666 SSL_clear_options(ssl, 0xFFFFFFFFL);
2667 SSL_set_options(ssl, SSL_CTX_get_options(context->sni_entry_list[i].ctx));
2668 }
2669
2670 /*
2671 * Have to do extra call back next to get client algorithms
2672 * SSL_get_client_ciphers() does not work this early on
2673 */
2674 SSL_set_session_secret_cb(ssl, tls_secret_call_back, arg);
2675 return SSL_TLSEXT_ERR_OK;
2676
2677error:
2678 return SSL_TLSEXT_ERR_ALERT_WARNING;
2679}
2680
2681/* OpenSSL < 1.1.1 */
2682/*
2683 * During the SSL/TLS initial negotiations, psk_tls_server_name_call_back() is
2684 * called to see if SNI is being used.
2685 *
2686 * Set up by SSL_CTX_set_tlsext_servername_callback()
2687 * in coap_dtls_context_set_spsk()
2688 */
2689static int
2690psk_tls_server_name_call_back(SSL *ssl,
2691 int *sd COAP_UNUSED,
2692 void *arg
2693 ) {
2694 coap_dtls_spsk_t *setup_data = (coap_dtls_spsk_t *)arg;
2695
2696 if (!ssl) {
2697 return SSL_TLSEXT_ERR_NOACK;
2698 }
2699
2700 if (setup_data->validate_sni_call_back) {
2701 /* SNI checking requested */
2702 coap_session_t *c_session = (coap_session_t *)SSL_get_app_data(ssl);
2703 coap_openssl_context_t *o_context =
2704 ((coap_openssl_context_t *)c_session->context->dtls_context);
2705 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
2706 size_t i;
2707 char lhint[COAP_DTLS_HINT_LENGTH];
2708
2709 if (!sni || !sni[0]) {
2710 sni = "";
2711 }
2712 for (i = 0; i < o_context->psk_sni_count; i++) {
2713 if (!strcasecmp(sni, (char *)o_context->psk_sni_entry_list[i].sni)) {
2714 break;
2715 }
2716 }
2717 if (i == o_context->psk_sni_count) {
2718 SSL_CTX *ctx;
2719 const coap_dtls_spsk_info_t *new_entry;
2720
2721 coap_lock_callback_ret(new_entry, c_session->context,
2722 setup_data->validate_sni_call_back(sni,
2723 c_session,
2724 setup_data->sni_call_back_arg));
2725 if (!new_entry) {
2726 return SSL_TLSEXT_ERR_ALERT_FATAL;
2727 }
2728 /* Need to set up a new SSL_CTX to switch to */
2729 if (c_session->proto == COAP_PROTO_DTLS) {
2730 /* Set up DTLS context */
2731 ctx = SSL_CTX_new(DTLS_method());
2732 if (!ctx)
2733 goto error;
2734 SSL_CTX_set_min_proto_version(ctx, DTLS1_2_VERSION);
2735 SSL_CTX_set_app_data(ctx, &o_context->dtls);
2736 SSL_CTX_set_read_ahead(ctx, 1);
2737 SSL_CTX_set_cipher_list(ctx, COAP_OPENSSL_CIPHERS);
2738 SSL_CTX_set_cookie_generate_cb(ctx, coap_dtls_generate_cookie);
2739 SSL_CTX_set_cookie_verify_cb(ctx, coap_dtls_verify_cookie);
2740 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2741 SSL_CTX_set_options(ctx, SSL_OP_NO_QUERY_MTU);
2742 }
2743#if !COAP_DISABLE_TCP
2744 else {
2745 /* Set up TLS context */
2746 ctx = SSL_CTX_new(TLS_method());
2747 if (!ctx)
2748 goto error;
2749 SSL_CTX_set_app_data(ctx, &o_context->tls);
2750 SSL_CTX_set_min_proto_version(ctx, TLS1_VERSION);
2751 SSL_CTX_set_cipher_list(ctx, COAP_OPENSSL_CIPHERS);
2752 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2753 SSL_CTX_set_alpn_select_cb(ctx, server_alpn_callback, NULL);
2754 }
2755#endif /* !COAP_DISABLE_TCP */
2756
2757 o_context->psk_sni_entry_list =
2758 OPENSSL_realloc(o_context->psk_sni_entry_list,
2759 (o_context->psk_sni_count+1)*sizeof(psk_sni_entry));
2760 o_context->psk_sni_entry_list[o_context->psk_sni_count].sni =
2761 OPENSSL_strdup(sni);
2762 o_context->psk_sni_entry_list[o_context->psk_sni_count].psk_info =
2763 *new_entry;
2764 o_context->psk_sni_entry_list[o_context->psk_sni_count].ctx =
2765 ctx;
2766 o_context->psk_sni_count++;
2767 }
2768 SSL_set_SSL_CTX(ssl, o_context->psk_sni_entry_list[i].ctx);
2769 SSL_clear_options(ssl, 0xFFFFFFFFL);
2770 SSL_set_options(ssl,
2771 SSL_CTX_get_options(o_context->psk_sni_entry_list[i].ctx));
2773 &o_context->psk_sni_entry_list[i].psk_info.key);
2774 snprintf(lhint, sizeof(lhint), "%.*s",
2775 (int)o_context->psk_sni_entry_list[i].psk_info.hint.length,
2776 o_context->psk_sni_entry_list[i].psk_info.hint.s);
2777 SSL_use_psk_identity_hint(ssl, lhint);
2778 }
2779
2780 /*
2781 * Have to do extra call back next to get client algorithms
2782 * SSL_get_client_ciphers() does not work this early on
2783 */
2784 SSL_set_session_secret_cb(ssl, tls_secret_call_back, arg);
2785 return SSL_TLSEXT_ERR_OK;
2786
2787error:
2788 return SSL_TLSEXT_ERR_ALERT_WARNING;
2789}
2790#else /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
2791/* OpenSSL >= 1.1.1 */
2792/*
2793 * During the SSL/TLS initial negotiations, tls_client_hello_call_back() is
2794 * called early in the Client Hello processing so it is possible to determine
2795 * whether this is a PKI or PSK incoming request and adjust the ciphers if
2796 * necessary.
2797 *
2798 * Set up by SSL_CTX_set_client_hello_cb().
2799 */
2800static int
2801tls_client_hello_call_back(SSL *ssl,
2802 int *al,
2803 void *arg COAP_UNUSED
2804 ) {
2805 coap_session_t *session;
2806 coap_openssl_context_t *dtls_context;
2807 coap_dtls_pki_t *setup_data;
2808 int psk_requested = 0;
2809 const unsigned char *out;
2810 size_t outlen;
2811
2812 if (!ssl) {
2813 *al = SSL_AD_INTERNAL_ERROR;
2814 return SSL_CLIENT_HELLO_ERROR;
2815 }
2816 session = (coap_session_t *)SSL_get_app_data(ssl);
2817 assert(session != NULL);
2818 assert(session->context != NULL);
2819 assert(session->context->dtls_context != NULL);
2820 if (session == NULL ||
2821 session->context == NULL ||
2822 session->context->dtls_context == NULL) {
2823 *al = SSL_AD_INTERNAL_ERROR;
2824 return SSL_CLIENT_HELLO_ERROR;
2825 }
2826 dtls_context = (coap_openssl_context_t *)session->context->dtls_context;
2827 setup_data = &dtls_context->setup_data;
2828
2829 /*
2830 * See if PSK being requested
2831 */
2832 if ((session->psk_key) ||
2833 (session->context->spsk_setup_data.psk_info.key.s &&
2835 size_t len = SSL_client_hello_get0_ciphers(ssl, &out);
2836 STACK_OF(SSL_CIPHER) *peer_ciphers = NULL;
2837 STACK_OF(SSL_CIPHER) *scsvc = NULL;
2838
2839 if (len && SSL_bytes_to_cipher_list(ssl, out, len,
2840 SSL_client_hello_isv2(ssl),
2841 &peer_ciphers, &scsvc)) {
2842 int ii;
2843 for (ii = 0; ii < sk_SSL_CIPHER_num(peer_ciphers); ii++) {
2844 const SSL_CIPHER *peer_cipher = sk_SSL_CIPHER_value(peer_ciphers, ii);
2845
2847 "Client cipher: %s (%04x)\n",
2848 SSL_CIPHER_get_name(peer_cipher),
2849 SSL_CIPHER_get_protocol_id(peer_cipher));
2850 if (strstr(SSL_CIPHER_get_name(peer_cipher), "PSK")) {
2851 psk_requested = 1;
2852 break;
2853 }
2854 }
2855 }
2856 sk_SSL_CIPHER_free(peer_ciphers);
2857 sk_SSL_CIPHER_free(scsvc);
2858 }
2859
2860 if (psk_requested) {
2861 /*
2862 * Client has requested PSK and it is supported
2863 */
2864 coap_log_debug(" %s: PSK request\n",
2865 coap_session_str(session));
2866 SSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
2867 if (setup_data->additional_tls_setup_call_back) {
2868 /* Additional application setup wanted */
2869 if (!setup_data->additional_tls_setup_call_back(ssl, setup_data))
2870 return 0;
2871 }
2872 return SSL_CLIENT_HELLO_SUCCESS;
2873 }
2874
2875 /*
2876 * Handle Certificate requests
2877 */
2878
2879 /*
2880 * Determine what type of certificate is being requested
2881 */
2882 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_client_certificate_type,
2883 &out, &outlen)) {
2884 size_t ii;
2885 for (ii = 0; ii < outlen; ii++) {
2886 switch (out[ii]) {
2887 case 0:
2888 /* RFC6091 X.509 */
2889 if (outlen >= 2) {
2890 /* X.509 cannot be the singular entry. RFC6091 3.1. Client Hello */
2891 goto is_x509;
2892 }
2893 break;
2894 case 2:
2895 /* RFC7250 RPK - not yet supported */
2896 break;
2897 default:
2898 break;
2899 }
2900 }
2901 *al = SSL_AD_UNSUPPORTED_EXTENSION;
2902 return SSL_CLIENT_HELLO_ERROR;
2903 }
2904
2905is_x509:
2906 if (setup_data->validate_sni_call_back) {
2907 /*
2908 * SNI checking requested
2909 */
2910 coap_dtls_pki_t sni_setup_data;
2911 coap_openssl_context_t *context =
2912 ((coap_openssl_context_t *)session->context->dtls_context);
2913 const char *sni = "";
2914 char *sni_tmp = NULL;
2915 size_t i;
2916
2917 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_server_name, &out, &outlen) &&
2918 outlen > 5 &&
2919 (((out[0]<<8) + out[1] +2) == (int)outlen) &&
2920 out[2] == TLSEXT_NAMETYPE_host_name &&
2921 (((out[3]<<8) + out[4] +2 +3) == (int)outlen)) {
2922 /* Skip over length, type and length */
2923 out += 5;
2924 outlen -= 5;
2925 sni_tmp = OPENSSL_malloc(outlen+1);
2926 sni_tmp[outlen] = '\000';
2927 memcpy(sni_tmp, out, outlen);
2928 sni = sni_tmp;
2929 }
2930 /* Is this a cached entry? */
2931 for (i = 0; i < context->sni_count; i++) {
2932 if (!strcasecmp(sni, context->sni_entry_list[i].sni)) {
2933 break;
2934 }
2935 }
2936 if (i == context->sni_count) {
2937 /*
2938 * New SNI request
2939 */
2940 coap_dtls_key_t *new_entry;
2941
2942 coap_lock_callback_ret(new_entry, session->context,
2943 setup_data->validate_sni_call_back(sni,
2944 setup_data->sni_call_back_arg));
2945 if (!new_entry) {
2946 *al = SSL_AD_UNRECOGNIZED_NAME;
2947 return SSL_CLIENT_HELLO_ERROR;
2948 }
2949
2950
2951 context->sni_entry_list = OPENSSL_realloc(context->sni_entry_list,
2952 (context->sni_count+1)*sizeof(sni_entry));
2953 context->sni_entry_list[context->sni_count].sni = OPENSSL_strdup(sni);
2954 context->sni_entry_list[context->sni_count].pki_key = *new_entry;
2955 context->sni_count++;
2956 }
2957 if (sni_tmp) {
2958 OPENSSL_free(sni_tmp);
2959 }
2960 sni_setup_data = *setup_data;
2961 sni_setup_data.pki_key = context->sni_entry_list[i].pki_key;
2962 setup_pki_ssl(ssl, &sni_setup_data, COAP_DTLS_ROLE_SERVER);
2963 } else {
2964 setup_pki_ssl(ssl, setup_data, COAP_DTLS_ROLE_SERVER);
2965 }
2966
2967 coap_log_debug(" %s: Using PKI ciphers\n",
2968 coap_session_str(session));
2969
2970 if (setup_data->verify_peer_cert) {
2971 SSL_set_verify(ssl,
2972 SSL_VERIFY_PEER |
2973 SSL_VERIFY_CLIENT_ONCE |
2974 SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2975 tls_verify_call_back);
2976 } else {
2977 SSL_set_verify(ssl, SSL_VERIFY_NONE, tls_verify_call_back);
2978 }
2979
2980 /* Check CA Chain */
2981 if (setup_data->cert_chain_validation)
2982 SSL_set_verify_depth(ssl, setup_data->cert_chain_verify_depth + 2);
2983
2984 /* Certificate Revocation */
2985 if (setup_data->check_cert_revocation) {
2986 X509_VERIFY_PARAM *param;
2987
2988 param = X509_VERIFY_PARAM_new();
2989 X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
2990 SSL_set1_param(ssl, param);
2991 X509_VERIFY_PARAM_free(param);
2992 }
2993 if (setup_data->additional_tls_setup_call_back) {
2994 /* Additional application setup wanted */
2995 if (!setup_data->additional_tls_setup_call_back(ssl, setup_data))
2996 return 0;
2997 }
2998 return SSL_CLIENT_HELLO_SUCCESS;
2999}
3000
3001/* OpenSSL >= 1.1.1 */
3002/*
3003 * During the SSL/TLS initial negotiations, psk_tls_client_hello_call_back() is
3004 * called early in the Client Hello processing so it is possible to determine
3005 * whether SNI needs to be handled
3006 *
3007 * Set up by SSL_CTX_set_client_hello_cb().
3008 */
3009static int
3010psk_tls_client_hello_call_back(SSL *ssl,
3011 int *al,
3012 void *arg COAP_UNUSED
3013 ) {
3014 coap_session_t *c_session;
3015 coap_openssl_context_t *o_context;
3016 coap_dtls_spsk_t *setup_data;
3017 const unsigned char *out;
3018 size_t outlen;
3019
3020 if (!ssl)
3021 goto int_err;
3022 c_session = (coap_session_t *)SSL_get_app_data(ssl);
3023 if (!c_session || !c_session->context) {
3024 goto int_err;
3025 }
3026 o_context = (coap_openssl_context_t *)c_session->context->dtls_context;
3027 if (!o_context) {
3028 goto int_err;
3029 }
3030 setup_data = &c_session->context->spsk_setup_data;
3031
3032 if (setup_data->validate_sni_call_back) {
3033 /*
3034 * SNI checking requested
3035 */
3036 const char *sni = "";
3037 char *sni_tmp = NULL;
3038 size_t i;
3039 char lhint[COAP_DTLS_HINT_LENGTH];
3040
3041 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_server_name, &out, &outlen) &&
3042 outlen > 5 &&
3043 (((out[0]<<8) + out[1] +2) == (int)outlen) &&
3044 out[2] == TLSEXT_NAMETYPE_host_name &&
3045 (((out[3]<<8) + out[4] +2 +3) == (int)outlen)) {
3046 /* Skip over length, type and length */
3047 out += 5;
3048 outlen -= 5;
3049 sni_tmp = OPENSSL_malloc(outlen+1);
3050 if (sni_tmp) {
3051 sni_tmp[outlen] = '\000';
3052 memcpy(sni_tmp, out, outlen);
3053 sni = sni_tmp;
3054 }
3055 }
3056
3057 /* Is this a cached entry? */
3058 for (i = 0; i < o_context->psk_sni_count; i++) {
3059 if (strcasecmp(sni, o_context->psk_sni_entry_list[i].sni) == 0) {
3060 break;
3061 }
3062 }
3063 if (i == o_context->psk_sni_count) {
3064 /*
3065 * New SNI request
3066 */
3067 psk_sni_entry *tmp_entry;
3068 const coap_dtls_spsk_info_t *new_entry;
3069
3070 coap_lock_callback_ret(new_entry, c_session->context,
3071 setup_data->validate_sni_call_back(
3072 sni,
3073 c_session,
3074 setup_data->sni_call_back_arg));
3075 if (!new_entry) {
3076 *al = SSL_AD_UNRECOGNIZED_NAME;
3077 return SSL_CLIENT_HELLO_ERROR;
3078 }
3079
3080 tmp_entry =
3081 OPENSSL_realloc(o_context->psk_sni_entry_list,
3082 (o_context->psk_sni_count+1)*sizeof(sni_entry));
3083 if (tmp_entry) {
3084 o_context->psk_sni_entry_list = tmp_entry;
3085 o_context->psk_sni_entry_list[o_context->psk_sni_count]
3086 .sni =
3087 OPENSSL_strdup(sni);
3088 if (o_context->psk_sni_entry_list[o_context->psk_sni_count].sni) {
3089 o_context->psk_sni_entry_list[o_context->psk_sni_count].psk_info =
3090 *new_entry;
3091 o_context->psk_sni_count++;
3092 }
3093 }
3094 }
3095 if (sni_tmp) {
3096 OPENSSL_free(sni_tmp);
3097 }
3098 if (coap_session_refresh_psk_hint(c_session,
3099 &o_context->psk_sni_entry_list[i].psk_info.hint)
3100 == 0) {
3101 goto int_err;
3102 }
3103 if (coap_session_refresh_psk_key(c_session,
3104 &o_context->psk_sni_entry_list[i].psk_info.key)
3105 == 0) {
3106 goto int_err;
3107 }
3108 if (o_context->psk_sni_entry_list[i].psk_info.hint.s) {
3109 snprintf(lhint, sizeof(lhint), "%.*s",
3110 (int)o_context->psk_sni_entry_list[i].psk_info.hint.length,
3111 o_context->psk_sni_entry_list[i].psk_info.hint.s);
3112 SSL_use_psk_identity_hint(ssl, lhint);
3113 }
3114 }
3115 return SSL_CLIENT_HELLO_SUCCESS;
3116
3117int_err:
3118 *al = SSL_AD_INTERNAL_ERROR;
3119 return SSL_CLIENT_HELLO_ERROR;
3120}
3121#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3122#endif /* COAP_SERVER_SUPPORT */
3123
3124int
3126 const coap_dtls_pki_t *setup_data,
3127 const coap_dtls_role_t role) {
3128 coap_openssl_context_t *context =
3129 ((coap_openssl_context_t *)ctx->dtls_context);
3130 BIO *bio;
3131 if (!setup_data)
3132 return 0;
3133 context->setup_data = *setup_data;
3134
3135 if (context->setup_data.pki_key.key_type == COAP_PKI_KEY_DEFINE) {
3136 if (context->setup_data.pki_key.key.define.ca_def == COAP_PKI_KEY_DEF_ENGINE ||
3137 context->setup_data.pki_key.key.define.public_cert_def == COAP_PKI_KEY_DEF_ENGINE ||
3138 context->setup_data.pki_key.key.define.private_key_def == COAP_PKI_KEY_DEF_ENGINE) {
3139 if (!defined_engine) {
3140 coap_log_warn("setup_pki: OpenSSL Engine not configured, PKI not set up\n");
3141 return 0;
3142 }
3143 }
3144 }
3145
3146 if (!context->setup_data.verify_peer_cert) {
3147 /* Needs to be clear so that no CA DNs are transmitted */
3148 context->setup_data.check_common_ca = 0;
3149 /* Allow all of these but warn if issue */
3150 context->setup_data.allow_self_signed = 1;
3151 context->setup_data.allow_expired_certs = 1;
3152 context->setup_data.cert_chain_validation = 1;
3153 context->setup_data.cert_chain_verify_depth = 10;
3154 context->setup_data.check_cert_revocation = 1;
3155 context->setup_data.allow_no_crl = 1;
3156 context->setup_data.allow_expired_crl = 1;
3157 context->setup_data.allow_bad_md_hash = 1;
3158 context->setup_data.allow_short_rsa_length = 1;
3159 }
3160#if COAP_SERVER_SUPPORT
3161 if (role == COAP_DTLS_ROLE_SERVER) {
3162 if (context->dtls.ctx) {
3163 /* SERVER DTLS */
3164#if OPENSSL_VERSION_NUMBER < 0x10101000L
3165 if (!setup_pki_server(context->dtls.ctx, setup_data))
3166 return 0;
3167#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
3168 /* libcoap is managing TLS connection based on setup_data options */
3169 /* Need to set up logic to differentiate between a PSK or PKI session */
3170 /*
3171 * For OpenSSL 1.1.1, we need to use SSL_CTX_set_client_hello_cb()
3172 * which is not in 1.1.0
3173 */
3174#if OPENSSL_VERSION_NUMBER < 0x10101000L
3175 if (SSLeay() >= 0x10101000L) {
3176 coap_log_warn("OpenSSL compiled with %lux, linked with %lux, so "
3177 "no certificate checking\n",
3178 OPENSSL_VERSION_NUMBER, SSLeay());
3179 }
3180 SSL_CTX_set_tlsext_servername_arg(context->dtls.ctx, &context->setup_data);
3181 SSL_CTX_set_tlsext_servername_callback(context->dtls.ctx,
3182 tls_server_name_call_back);
3183#else /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3184 SSL_CTX_set_client_hello_cb(context->dtls.ctx,
3185 tls_client_hello_call_back,
3186 NULL);
3187#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3188 }
3189#if !COAP_DISABLE_TCP
3190 if (context->tls.ctx) {
3191 /* SERVER TLS */
3192#if OPENSSL_VERSION_NUMBER < 0x10101000L
3193 if (!setup_pki_server(context->tls.ctx, setup_data))
3194 return 0;
3195#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
3196 /* libcoap is managing TLS connection based on setup_data options */
3197 /* Need to set up logic to differentiate between a PSK or PKI session */
3198 /*
3199 * For OpenSSL 1.1.1, we need to use SSL_CTX_set_client_hello_cb()
3200 * which is not in 1.1.0
3201 */
3202#if OPENSSL_VERSION_NUMBER < 0x10101000L
3203 if (SSLeay() >= 0x10101000L) {
3204 coap_log_warn("OpenSSL compiled with %lux, linked with %lux, so "
3205 "no certificate checking\n",
3206 OPENSSL_VERSION_NUMBER, SSLeay());
3207 }
3208 SSL_CTX_set_tlsext_servername_arg(context->tls.ctx, &context->setup_data);
3209 SSL_CTX_set_tlsext_servername_callback(context->tls.ctx,
3210 tls_server_name_call_back);
3211#else /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3212 SSL_CTX_set_client_hello_cb(context->tls.ctx,
3213 tls_client_hello_call_back,
3214 NULL);
3215#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3216 /* TLS Only */
3217 SSL_CTX_set_alpn_select_cb(context->tls.ctx, server_alpn_callback, NULL);
3218 }
3219#endif /* !COAP_DISABLE_TCP */
3220 }
3221#else /* ! COAP_SERVER_SUPPORT */
3222 (void)role;
3223#endif /* ! COAP_SERVER_SUPPORT */
3224
3225 if (!context->dtls.ssl) {
3226 /* This is set up to handle new incoming sessions to a server */
3227 context->dtls.ssl = SSL_new(context->dtls.ctx);
3228 if (!context->dtls.ssl)
3229 return 0;
3230 bio = BIO_new(context->dtls.meth);
3231 if (!bio) {
3232 SSL_free(context->dtls.ssl);
3233 context->dtls.ssl = NULL;
3234 return 0;
3235 }
3236 SSL_set_bio(context->dtls.ssl, bio, bio);
3237 SSL_set_app_data(context->dtls.ssl, NULL);
3238 SSL_set_options(context->dtls.ssl, SSL_OP_COOKIE_EXCHANGE);
3239 SSL_set_mtu(context->dtls.ssl, COAP_DEFAULT_MTU);
3240 }
3241 context->psk_pki_enabled |= IS_PKI;
3242 if (setup_data->use_cid) {
3243 coap_log_warn("OpenSSL has no Connection-ID support\n");
3244 }
3245 return 1;
3246}
3247
3248int
3250 const char *ca_file,
3251 const char *ca_dir
3252 ) {
3253 coap_openssl_context_t *context =
3254 ((coap_openssl_context_t *)ctx->dtls_context);
3255 if (context->dtls.ctx) {
3256 if (!SSL_CTX_load_verify_locations(context->dtls.ctx, ca_file, ca_dir)) {
3257 coap_log_warn("Unable to install root CAs (%s : %s)\n",
3258 ca_file ? ca_file : "NULL", ca_dir ? ca_dir : "NULL");
3259 return 0;
3260 }
3261 }
3262#if !COAP_DISABLE_TCP
3263 if (context->tls.ctx) {
3264 if (!SSL_CTX_load_verify_locations(context->tls.ctx, ca_file, ca_dir)) {
3265 coap_log_warn("Unable to install root CAs (%s : %s)\n",
3266 ca_file ? ca_file : "NULL", ca_dir ? ca_dir : "NULL");
3267 return 0;
3268 }
3269 }
3270#endif /* !COAP_DISABLE_TCP */
3271 return 1;
3272}
3273
3274int
3276#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3277 coap_openssl_context_t *context =
3278 ((coap_openssl_context_t *)ctx->dtls_context);
3279 if (context->dtls.ctx) {
3280 if (!SSL_CTX_set_default_verify_store(context->dtls.ctx)) {
3281 coap_log_warn("Unable to load trusted root CAs\n");
3282 return 0;
3283 }
3284 }
3285#if !COAP_DISABLE_TCP
3286 if (context->tls.ctx) {
3287 if (!SSL_CTX_set_default_verify_store(context->tls.ctx)) {
3288 coap_log_warn("Unable to load trusted root CAs\n");
3289 return 0;
3290 }
3291 }
3292#endif /* !COAP_DISABLE_TCP */
3293 return 1;
3294#else /* OPENSSL_VERSION_NUMBER < 0x30000000L */
3295 (void)ctx;
3296 coap_log_warn("coap_context_set_pki_trust_store: (D)TLS environment "
3297 "not supported for OpenSSL < v3.0.0\n");
3298 return 0;
3299#endif /* OPENSSL_VERSION_NUMBER < 0x30000000L */
3300}
3301
3302int
3304 coap_openssl_context_t *context =
3305 ((coap_openssl_context_t *)ctx->dtls_context);
3306 return context->psk_pki_enabled ? 1 : 0;
3307}
3308
3309
3310void
3311coap_dtls_free_context(void *handle) {
3312 size_t i;
3313 coap_openssl_context_t *context = (coap_openssl_context_t *)handle;
3314
3315 if (context->dtls.ssl)
3316 SSL_free(context->dtls.ssl);
3317 if (context->dtls.ctx)
3318 SSL_CTX_free(context->dtls.ctx);
3319 if (context->dtls.cookie_hmac)
3320 HMAC_CTX_free(context->dtls.cookie_hmac);
3321 if (context->dtls.meth)
3322 BIO_meth_free(context->dtls.meth);
3323 if (context->dtls.bio_addr)
3324 BIO_ADDR_free(context->dtls.bio_addr);
3325#if !COAP_DISABLE_TCP
3326 if (context->tls.ctx)
3327 SSL_CTX_free(context->tls.ctx);
3328 if (context->tls.meth)
3329 BIO_meth_free(context->tls.meth);
3330#endif /* !COAP_DISABLE_TCP */
3331 for (i = 0; i < context->sni_count; i++) {
3332 OPENSSL_free(context->sni_entry_list[i].sni);
3333#if OPENSSL_VERSION_NUMBER < 0x10101000L
3334 SSL_CTX_free(context->sni_entry_list[i].ctx);
3335#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
3336 }
3337 if (context->sni_count)
3338 OPENSSL_free(context->sni_entry_list);
3339 for (i = 0; i < context->psk_sni_count; i++) {
3340 OPENSSL_free((char *)context->psk_sni_entry_list[i].sni);
3341#if OPENSSL_VERSION_NUMBER < 0x10101000L
3342 SSL_CTX_free(context->psk_sni_entry_list[i].ctx);
3343#endif /* OPENSSL_VERSION_NUMBER < 0x10101000L */
3344 }
3345 if (context->psk_sni_count)
3346 OPENSSL_free(context->psk_sni_entry_list);
3347 coap_free_type(COAP_STRING, context);
3348}
3349
3350#if COAP_SERVER_SUPPORT
3351void *
3353 BIO *nbio = NULL;
3354 SSL *nssl = NULL, *ssl = NULL;
3355 coap_ssl_data *data;
3356 coap_dtls_context_t *dtls = &((coap_openssl_context_t *)session->context->dtls_context)->dtls;
3357 int r;
3358 const coap_bin_const_t *psk_hint;
3359
3360 nssl = SSL_new(dtls->ctx);
3361 if (!nssl)
3362 goto error;
3363 nbio = BIO_new(dtls->meth);
3364 if (!nbio)
3365 goto error;
3366 SSL_set_bio(nssl, nbio, nbio);
3367 SSL_set_app_data(nssl, NULL);
3368 SSL_set_options(nssl, SSL_OP_COOKIE_EXCHANGE);
3369 SSL_set_mtu(nssl, (long)session->mtu);
3370 ssl = dtls->ssl;
3371 dtls->ssl = nssl;
3372 nssl = NULL;
3373 SSL_set_app_data(ssl, session);
3374
3375 data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
3376 data->session = session;
3377
3378 /* hint may get updated if/when handling SNI callback */
3379 psk_hint = coap_get_session_server_psk_hint(session);
3380 if (psk_hint != NULL && psk_hint->length) {
3381 char *hint = OPENSSL_malloc(psk_hint->length + 1);
3382
3383 if (hint) {
3384 memcpy(hint, psk_hint->s, psk_hint->length);
3385 hint[psk_hint->length] = '\000';
3386 SSL_use_psk_identity_hint(ssl, hint);
3387 OPENSSL_free(hint);
3388 } else {
3389 coap_log_warn("hint malloc failure\n");
3390 }
3391 }
3392
3393 r = SSL_accept(ssl);
3394 if (r == -1) {
3395 int err = SSL_get_error(ssl, r);
3396 if (err != SSL_ERROR_WANT_READ && err != SSL_ERROR_WANT_WRITE)
3397 r = 0;
3398 }
3399
3400 if (r == 0) {
3401 SSL_free(ssl);
3402 return NULL;
3403 }
3404
3405 return ssl;
3406
3407error:
3408 if (nssl)
3409 SSL_free(nssl);
3410 return NULL;
3411}
3412#endif /* COAP_SERVER_SUPPORT */
3413
3414#if COAP_CLIENT_SUPPORT
3415static int
3416setup_client_ssl_session(coap_session_t *session, SSL *ssl
3417 ) {
3418 coap_openssl_context_t *context =
3419 ((coap_openssl_context_t *)session->context->dtls_context);
3420
3421 if (context->psk_pki_enabled & IS_PSK) {
3422 coap_dtls_cpsk_t *setup_data = &session->cpsk_setup_data;
3423
3424 /* Issue SNI if requested */
3425 if (setup_data->client_sni &&
3426 SSL_set_tlsext_host_name(ssl, setup_data->client_sni) != 1) {
3427 coap_log_warn("SSL_set_tlsext_host_name: set '%s' failed",
3428 setup_data->client_sni);
3429 }
3430 SSL_set_psk_client_callback(ssl, coap_dtls_psk_client_callback);
3431#if COAP_SERVER_SUPPORT
3432 SSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
3433#endif /* COAP_SERVER_SUPPORT */
3434 SSL_set_cipher_list(ssl, COAP_OPENSSL_PSK_CIPHERS);
3435 if (setup_data->validate_ih_call_back) {
3436 if (session->proto == COAP_PROTO_DTLS) {
3437 SSL_set_max_proto_version(ssl, DTLS1_2_VERSION);
3438 }
3439#if !COAP_DISABLE_TCP
3440 else {
3441 SSL_set_max_proto_version(ssl, TLS1_2_VERSION);
3442 }
3443#endif /* !COAP_DISABLE_TCP */
3444 coap_log_debug("CoAP Client restricted to (D)TLS1.2 with Identity Hint callback\n");
3445 }
3446 }
3447 if ((context->psk_pki_enabled & IS_PKI) ||
3448 (context->psk_pki_enabled & (IS_PSK | IS_PKI)) == 0) {
3449 /*
3450 * If neither PSK or PKI have been set up, use PKI basics.
3451 * This works providing COAP_PKI_KEY_PEM has a value of 0.
3452 */
3453 coap_dtls_pki_t *setup_data = &context->setup_data;
3454
3455 if (!(context->psk_pki_enabled & IS_PKI)) {
3456 /* PKI not defined - set up some defaults */
3457 setup_data->verify_peer_cert = 1;
3458 setup_data->check_common_ca = 0;
3459 setup_data->allow_self_signed = 1;
3460 setup_data->allow_expired_certs = 1;
3461 setup_data->cert_chain_validation = 1;
3462 setup_data->cert_chain_verify_depth = 2;
3463 setup_data->check_cert_revocation = 1;
3464 setup_data->allow_no_crl = 1;
3465 setup_data->allow_expired_crl = 1;
3466 setup_data->is_rpk_not_cert = 0;
3467 setup_data->use_cid = 0;
3468 }
3469 if (!setup_pki_ssl(ssl, setup_data, COAP_DTLS_ROLE_CLIENT))
3470 return 0;
3471 /* libcoap is managing (D)TLS connection based on setup_data options */
3472#if !COAP_DISABLE_TCP
3473 if (session->proto == COAP_PROTO_TLS)
3474 SSL_set_alpn_protos(ssl, coap_alpn, sizeof(coap_alpn));
3475#endif /* !COAP_DISABLE_TCP */
3476
3477 /* Issue SNI if requested */
3478 if (setup_data->client_sni &&
3479 SSL_set_tlsext_host_name(ssl, setup_data->client_sni) != 1) {
3480 coap_log_warn("SSL_set_tlsext_host_name: set '%s' failed",
3481 setup_data->client_sni);
3482 }
3483 /* Certificate Revocation */
3484 if (setup_data->check_cert_revocation) {
3485 X509_VERIFY_PARAM *param;
3486
3487 param = X509_VERIFY_PARAM_new();
3488 X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
3489 SSL_set1_param(ssl, param);
3490 X509_VERIFY_PARAM_free(param);
3491 }
3492
3493 /* Verify Peer */
3494 if (setup_data->verify_peer_cert)
3495 SSL_set_verify(ssl,
3496 SSL_VERIFY_PEER |
3497 SSL_VERIFY_CLIENT_ONCE |
3498 SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
3499 tls_verify_call_back);
3500 else
3501 SSL_set_verify(ssl, SSL_VERIFY_NONE, tls_verify_call_back);
3502
3503 /* Check CA Chain */
3504 if (setup_data->cert_chain_validation)
3505 SSL_set_verify_depth(ssl, setup_data->cert_chain_verify_depth + 1);
3506
3507 }
3508#if COAP_DTLS_RETRANSMIT_MS != 1000
3509#if OPENSSL_VERSION_NUMBER >= 0x10101000L
3510 if (session->proto == COAP_PROTO_DTLS) {
3511 DTLS_set_timer_cb(ssl, timer_cb);
3512 }
3513#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3514#endif /* COAP_DTLS_RETRANSMIT_MS != 1000 */
3515 return 1;
3516}
3517
3518void *
3520 BIO *bio = NULL;
3521 SSL *ssl = NULL;
3522 coap_ssl_data *data;
3523 int r;
3524 coap_openssl_context_t *context = ((coap_openssl_context_t *)session->context->dtls_context);
3525 coap_dtls_context_t *dtls = &context->dtls;
3526
3527 ssl = SSL_new(dtls->ctx);
3528 if (!ssl)
3529 goto error;
3530 bio = BIO_new(dtls->meth);
3531 if (!bio)
3532 goto error;
3533 data = (coap_ssl_data *)BIO_get_data(bio);
3534 data->session = session;
3535 SSL_set_bio(ssl, bio, bio);
3536 SSL_set_app_data(ssl, session);
3537 SSL_set_options(ssl, SSL_OP_COOKIE_EXCHANGE);
3538 SSL_set_mtu(ssl, (long)session->mtu);
3539
3540 if (!setup_client_ssl_session(session, ssl))
3541 goto error;
3542
3543 session->dtls_timeout_count = 0;
3544
3545 r = SSL_connect(ssl);
3546 if (r == -1) {
3547 int ret = SSL_get_error(ssl, r);
3548 if (ret != SSL_ERROR_WANT_READ && ret != SSL_ERROR_WANT_WRITE)
3549 r = 0;
3550 }
3551
3552 if (r == 0)
3553 goto error;
3554
3555 session->tls = ssl;
3556 return ssl;
3557
3558error:
3559 if (ssl)
3560 SSL_free(ssl);
3561 return NULL;
3562}
3563
3564void
3566 SSL *ssl = (SSL *)session->tls;
3567 if (ssl)
3568 SSL_set_mtu(ssl, (long)session->mtu);
3569}
3570#endif /* COAP_CLIENT_SUPPORT */
3571
3572void
3574 SSL *ssl = (SSL *)session->tls;
3575 if (ssl) {
3576 if (!SSL_in_init(ssl) && !(SSL_get_shutdown(ssl) & SSL_SENT_SHUTDOWN)) {
3577 int r = SSL_shutdown(ssl);
3578 if (r == 0)
3579 SSL_shutdown(ssl);
3580 }
3581 SSL_free(ssl);
3582 session->tls = NULL;
3583 if (session->context)
3585 }
3586}
3587
3588ssize_t
3590 const uint8_t *data, size_t data_len) {
3591 int r;
3592 SSL *ssl = (SSL *)session->tls;
3593
3594 assert(ssl != NULL);
3595
3596 session->dtls_event = -1;
3597 ERR_clear_error();
3598 r = SSL_write(ssl, data, (int)data_len);
3599
3600 if (r <= 0) {
3601 int err = SSL_get_error(ssl, r);
3602 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
3603 r = 0;
3604 } else {
3605 if (err == SSL_ERROR_ZERO_RETURN)
3607 else if (err == SSL_ERROR_SSL) {
3608 unsigned long e = ERR_get_error();
3609
3610 coap_log_info("***%s: coap_dtls_send: cannot send PDU: %d: %s\n",
3611 coap_session_str(session),
3612 ERR_GET_REASON(e), ERR_reason_error_string(e));
3614 } else {
3615 coap_log_info("***%s: coap_dtls_send: cannot send PDU: %d\n",
3616 coap_session_str(session), err);
3617 }
3618 r = -1;
3619 }
3620 }
3621
3622 if (session->dtls_event >= 0) {
3623 /* COAP_EVENT_DTLS_CLOSED event reported in coap_session_disconnected_lkd() */
3624 if (session->dtls_event != COAP_EVENT_DTLS_CLOSED)
3625 coap_handle_event_lkd(session->context, session->dtls_event, session);
3626 if (session->dtls_event == COAP_EVENT_DTLS_ERROR ||
3627 session->dtls_event == COAP_EVENT_DTLS_CLOSED) {
3629 r = -1;
3630 }
3631 }
3632
3633 if (r > 0) {
3634 if (r == (ssize_t)data_len)
3635 coap_log_debug("* %s: dtls: sent %4d bytes\n",
3636 coap_session_str(session), r);
3637 else
3638 coap_log_debug("* %s: dtls: sent %4d of %4zd bytes\n",
3639 coap_session_str(session), r, data_len);
3640 }
3641 return r;
3642}
3643
3644int
3646 return 0;
3647}
3648
3650coap_dtls_get_context_timeout(void *dtls_context) {
3651 (void)dtls_context;
3652 return 0;
3653}
3654
3657 SSL *ssl = (SSL *)session->tls;
3658 coap_ssl_data *ssl_data;
3659
3660 assert(ssl != NULL && session->state == COAP_SESSION_STATE_HANDSHAKE);
3661 ssl_data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
3662 return ssl_data->timeout;
3663}
3664
3665/*
3666 * return 1 timed out
3667 * 0 still timing out
3668 */
3669int
3671 SSL *ssl = (SSL *)session->tls;
3672
3673 assert(ssl != NULL && session->state == COAP_SESSION_STATE_HANDSHAKE);
3674 if ((++session->dtls_timeout_count > session->max_retransmit) ||
3675 (DTLSv1_handle_timeout(ssl) < 0)) {
3676 /* Too many retries */
3678 return 1;
3679 }
3680 return 0;
3681}
3682
3683#if COAP_SERVER_SUPPORT
3684int
3686 const uint8_t *data, size_t data_len) {
3687 coap_dtls_context_t *dtls = &((coap_openssl_context_t *)session->context->dtls_context)->dtls;
3688 coap_ssl_data *ssl_data;
3689 int r;
3690
3691 SSL_set_mtu(dtls->ssl, (long)session->mtu);
3692 ssl_data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(dtls->ssl));
3693 assert(ssl_data != NULL);
3694 if (ssl_data->pdu_len) {
3695 coap_log_err("** %s: Previous data not read %u bytes\n",
3696 coap_session_str(session), ssl_data->pdu_len);
3697 }
3698 ssl_data->session = session;
3699 ssl_data->pdu = data;
3700 ssl_data->pdu_len = (unsigned)data_len;
3701 r = DTLSv1_listen(dtls->ssl, dtls->bio_addr);
3702 if (r <= 0) {
3703 int err = SSL_get_error(dtls->ssl, r);
3704 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
3705 /* Got a ClientHello, sent-out a VerifyRequest */
3706 r = 0;
3707 }
3708 } else {
3709 /* Got a valid answer to a VerifyRequest */
3710 r = 1;
3711 }
3712
3713 /*
3714 * Cannot check if data is left on the stack in error as DTLSv1_listen()
3715 * only does a 'peek' read of the incoming data.
3716 *
3717 */
3718 return r;
3719}
3720#endif /* COAP_SERVER_SUPPORT */
3721
3722int
3723coap_dtls_receive(coap_session_t *session, const uint8_t *data, size_t data_len) {
3724 coap_ssl_data *ssl_data;
3725 SSL *ssl = (SSL *)session->tls;
3726 int r;
3727#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3728 int retry = 0;
3729#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
3730
3731 assert(ssl != NULL);
3732
3733 int in_init = SSL_in_init(ssl);
3734 uint8_t pdu[COAP_RXBUFFER_SIZE];
3735 ssl_data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
3736 assert(ssl_data != NULL);
3737
3738 if (ssl_data->pdu_len) {
3739 coap_log_err("** %s: Previous data not read %u bytes\n",
3740 coap_session_str(session), ssl_data->pdu_len);
3741 }
3742 ssl_data->pdu = data;
3743 ssl_data->pdu_len = (unsigned)data_len;
3744
3745 session->dtls_event = -1;
3746#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3747retry:
3748#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
3749 ERR_clear_error();
3750 r = SSL_read(ssl, pdu, (int)sizeof(pdu));
3751 if (r > 0) {
3752 coap_log_debug("* %s: dtls: recv %4d bytes\n",
3753 coap_session_str(session), r);
3754 r = coap_handle_dgram(session->context, session, pdu, (size_t)r);
3755 goto finished;
3756 } else {
3757 int err = SSL_get_error(ssl, r);
3758 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
3759 if (in_init && SSL_is_init_finished(ssl)) {
3760 coap_dtls_log(COAP_LOG_INFO, "* %s: Using cipher: %s\n",
3761 coap_session_str(session), SSL_get_cipher_name(ssl));
3763 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
3764 }
3765 r = 0;
3766 } else {
3767 if (err == SSL_ERROR_ZERO_RETURN) /* Got a close notify alert from the remote side */
3769 else if (err == SSL_ERROR_SSL) {
3770 unsigned long e = ERR_get_error();
3771
3772#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3773#include <openssl/proverr.h>
3774 if (ERR_GET_REASON(e) == PROV_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES && !retry) {
3775 /* Loading trust store - first access causes a directory read error */
3776 retry = 1;
3777 goto retry;
3778 }
3779#endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */
3780 coap_log_info("***%s: coap_dtls_receive: cannot recv PDU: %d: %s\n",
3781 coap_session_str(session),
3782 ERR_GET_REASON(e), ERR_reason_error_string(e));
3784 } else {
3785 coap_log_info("***%s: coap_dtls_receive: cannot send PDU %d\n",
3786 coap_session_str(session), err);
3787 }
3788 r = -1;
3789 }
3790 if (session->dtls_event >= 0) {
3791 /* COAP_EVENT_DTLS_CLOSED event reported in coap_session_disconnected_lkd() */
3792 if (session->dtls_event != COAP_EVENT_DTLS_CLOSED)
3793 coap_handle_event_lkd(session->context, session->dtls_event, session);
3794 if (session->dtls_event == COAP_EVENT_DTLS_ERROR ||
3795 session->dtls_event == COAP_EVENT_DTLS_CLOSED) {
3797 ssl_data = NULL;
3798 r = -1;
3799 }
3800 }
3801 }
3802
3803finished:
3804 if (ssl_data && ssl_data->pdu_len) {
3805 /* pdu data is held on stack which will not stay there */
3806 coap_log_debug("coap_dtls_receive: ret %d: remaining data %u\n", r, ssl_data->pdu_len);
3807 ssl_data->pdu_len = 0;
3808 ssl_data->pdu = NULL;
3809 }
3810 return r;
3811}
3812
3813unsigned int
3815 unsigned int overhead = 37;
3816 const SSL_CIPHER *s_ciph = NULL;
3817 if (session->tls != NULL)
3818 s_ciph = SSL_get_current_cipher(session->tls);
3819 if (s_ciph) {
3820 unsigned int ivlen, maclen, blocksize = 1, pad = 0;
3821
3822 const EVP_CIPHER *e_ciph;
3823 const EVP_MD *e_md;
3824 char cipher[128];
3825
3826 e_ciph = EVP_get_cipherbynid(SSL_CIPHER_get_cipher_nid(s_ciph));
3827
3828 switch (EVP_CIPHER_mode(e_ciph)) {
3829 case EVP_CIPH_GCM_MODE:
3830 ivlen = EVP_GCM_TLS_EXPLICIT_IV_LEN;
3831 maclen = EVP_GCM_TLS_TAG_LEN;
3832 break;
3833
3834 case EVP_CIPH_CCM_MODE:
3835 ivlen = EVP_CCM_TLS_EXPLICIT_IV_LEN;
3836 SSL_CIPHER_description(s_ciph, cipher, sizeof(cipher));
3837 if (strstr(cipher, "CCM8"))
3838 maclen = 8;
3839 else
3840 maclen = 16;
3841 break;
3842
3843 case EVP_CIPH_CBC_MODE:
3844 e_md = EVP_get_digestbynid(SSL_CIPHER_get_digest_nid(s_ciph));
3845 blocksize = EVP_CIPHER_block_size(e_ciph);
3846 ivlen = EVP_CIPHER_iv_length(e_ciph);
3847 pad = 1;
3848 maclen = EVP_MD_size(e_md);
3849 break;
3850
3851 case EVP_CIPH_STREAM_CIPHER:
3852 /* Seen with PSK-CHACHA20-POLY1305 */
3853 ivlen = 8;
3854 maclen = 8;
3855 break;
3856
3857 default:
3858 SSL_CIPHER_description(s_ciph, cipher, sizeof(cipher));
3859 coap_log_warn("Unknown overhead for DTLS with cipher %s\n",
3860 cipher);
3861 ivlen = 8;
3862 maclen = 16;
3863 break;
3864 }
3865 overhead = DTLS1_RT_HEADER_LENGTH + ivlen + maclen + blocksize - 1 + pad;
3866 }
3867 return overhead;
3868}
3869
3870#if !COAP_DISABLE_TCP
3871#if COAP_CLIENT_SUPPORT
3872void *
3874 BIO *bio = NULL;
3875 SSL *ssl = NULL;
3876 int r;
3877 coap_openssl_context_t *context = ((coap_openssl_context_t *)session->context->dtls_context);
3878 coap_tls_context_t *tls = &context->tls;
3879
3880 ssl = SSL_new(tls->ctx);
3881 if (!ssl)
3882 goto error;
3883 bio = BIO_new(tls->meth);
3884 if (!bio)
3885 goto error;
3886 BIO_set_data(bio, session);
3887 SSL_set_bio(ssl, bio, bio);
3888 SSL_set_app_data(ssl, session);
3889
3890 if (!setup_client_ssl_session(session, ssl))
3891 return 0;
3892
3893 r = SSL_connect(ssl);
3894 if (r == -1) {
3895 int ret = SSL_get_error(ssl, r);
3896 if (ret != SSL_ERROR_WANT_READ && ret != SSL_ERROR_WANT_WRITE)
3897 r = 0;
3898 if (ret == SSL_ERROR_WANT_READ)
3899 session->sock.flags |= COAP_SOCKET_WANT_READ;
3900 if (ret == SSL_ERROR_WANT_WRITE) {
3901 session->sock.flags |= COAP_SOCKET_WANT_WRITE;
3902#ifdef COAP_EPOLL_SUPPORT
3903 coap_epoll_ctl_mod(&session->sock,
3904 EPOLLOUT |
3905 ((session->sock.flags & COAP_SOCKET_WANT_READ) ?
3906 EPOLLIN : 0),
3907 __func__);
3908#endif /* COAP_EPOLL_SUPPORT */
3909 }
3910 }
3911
3912 if (r == 0)
3913 goto error;
3914
3915 session->tls = ssl;
3916 if (SSL_is_init_finished(ssl)) {
3918 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
3919 }
3920
3921 return ssl;
3922
3923error:
3924 if (ssl)
3925 SSL_free(ssl);
3926 return NULL;
3927}
3928#endif /* COAP_CLIENT_SUPPORT */
3929
3930#if COAP_SERVER_SUPPORT
3931void *
3933 BIO *bio = NULL;
3934 SSL *ssl = NULL;
3935 coap_tls_context_t *tls = &((coap_openssl_context_t *)session->context->dtls_context)->tls;
3936 int r;
3937 const coap_bin_const_t *psk_hint;
3938
3939 ssl = SSL_new(tls->ctx);
3940 if (!ssl)
3941 goto error;
3942 bio = BIO_new(tls->meth);
3943 if (!bio)
3944 goto error;
3945 BIO_set_data(bio, session);
3946 SSL_set_bio(ssl, bio, bio);
3947 SSL_set_app_data(ssl, session);
3948
3949 psk_hint = coap_get_session_server_psk_hint(session);
3950 if (psk_hint != NULL && psk_hint->length) {
3951 char *hint = OPENSSL_malloc(psk_hint->length + 1);
3952
3953 if (hint) {
3954 memcpy(hint, psk_hint->s, psk_hint->length);
3955 hint[psk_hint->length] = '\000';
3956 SSL_use_psk_identity_hint(ssl, hint);
3957 OPENSSL_free(hint);
3958 } else {
3959 coap_log_warn("hint malloc failure\n");
3960 }
3961 }
3962
3963 r = SSL_accept(ssl);
3964 if (r == -1) {
3965 int err = SSL_get_error(ssl, r);
3966 if (err != SSL_ERROR_WANT_READ && err != SSL_ERROR_WANT_WRITE)
3967 r = 0;
3968 if (err == SSL_ERROR_WANT_READ)
3969 session->sock.flags |= COAP_SOCKET_WANT_READ;
3970 if (err == SSL_ERROR_WANT_WRITE) {
3971 session->sock.flags |= COAP_SOCKET_WANT_WRITE;
3972#ifdef COAP_EPOLL_SUPPORT
3973 coap_epoll_ctl_mod(&session->sock,
3974 EPOLLOUT |
3975 ((session->sock.flags & COAP_SOCKET_WANT_READ) ?
3976 EPOLLIN : 0),
3977 __func__);
3978#endif /* COAP_EPOLL_SUPPORT */
3979 }
3980 }
3981
3982 if (r == 0)
3983 goto error;
3984
3985 session->tls = ssl;
3986 if (SSL_is_init_finished(ssl)) {
3988 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
3989 }
3990
3991#if COAP_DTLS_RETRANSMIT_MS != 1000
3992#if OPENSSL_VERSION_NUMBER >= 0x10101000L
3993 if (session->proto == COAP_PROTO_DTLS) {
3994 DTLS_set_timer_cb(ssl, timer_cb);
3995 }
3996#endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
3997#endif /* COAP_DTLS_RETRANSMIT_MS != 1000 */
3998
3999 return ssl;
4000
4001error:
4002 if (ssl)
4003 SSL_free(ssl);
4004 return NULL;
4005}
4006#endif /* COAP_SERVER_SUPPORT */
4007
4008void
4010 SSL *ssl = (SSL *)session->tls;
4011 if (ssl) {
4012 if (!SSL_in_init(ssl) && !(SSL_get_shutdown(ssl) & SSL_SENT_SHUTDOWN)) {
4013 int r = SSL_shutdown(ssl);
4014 if (r == 0)
4015 SSL_shutdown(ssl);
4016 }
4017 SSL_free(ssl);
4018 session->tls = NULL;
4019 if (session->context)
4021 }
4022}
4023
4024/*
4025 * strm
4026 * return +ve Number of bytes written.
4027 * -1 Error (error in errno).
4028 */
4029ssize_t
4030coap_tls_write(coap_session_t *session, const uint8_t *data, size_t data_len) {
4031 SSL *ssl = (SSL *)session->tls;
4032 int r, in_init;
4033
4034 if (ssl == NULL)
4035 return -1;
4036
4037 in_init = !SSL_is_init_finished(ssl);
4038 session->dtls_event = -1;
4039 ERR_clear_error();
4040 r = SSL_write(ssl, data, (int)data_len);
4041
4042 if (r <= 0) {
4043 int err = SSL_get_error(ssl, r);
4044 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
4045 if (in_init && SSL_is_init_finished(ssl)) {
4046 coap_dtls_log(COAP_LOG_INFO, "* %s: Using cipher: %s\n",
4047 coap_session_str(session), SSL_get_cipher_name(ssl));
4049 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
4050 }
4051 if (err == SSL_ERROR_WANT_READ)
4052 session->sock.flags |= COAP_SOCKET_WANT_READ;
4053 else if (err == SSL_ERROR_WANT_WRITE) {
4054 session->sock.flags |= COAP_SOCKET_WANT_WRITE;
4055#ifdef COAP_EPOLL_SUPPORT
4056 coap_epoll_ctl_mod(&session->sock,
4057 EPOLLOUT |
4058 ((session->sock.flags & COAP_SOCKET_WANT_READ) ?
4059 EPOLLIN : 0),
4060 __func__);
4061#endif /* COAP_EPOLL_SUPPORT */
4062 }
4063 r = 0;
4064 } else {
4065 if (err == SSL_ERROR_ZERO_RETURN)
4067 else if (err == SSL_ERROR_SSL) {
4068 unsigned long e = ERR_get_error();
4069
4070 coap_log_info("***%s: coap_tls_write: cannot send PDU: %d: %s\n",
4071 coap_session_str(session),
4072 ERR_GET_REASON(e), ERR_reason_error_string(e));
4074 } else {
4075 coap_log_info("***%s: coap_tls_send: cannot send PDU: %d\n",
4076 coap_session_str(session), err);
4077 }
4078 r = -1;
4079 }
4080 } else if (in_init && SSL_is_init_finished(ssl)) {
4081 coap_dtls_log(COAP_LOG_INFO, "* %s: Using cipher: %s\n",
4082 coap_session_str(session), SSL_get_cipher_name(ssl));
4084 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
4085 }
4086
4087 if (session->dtls_event >= 0) {
4088 /* COAP_EVENT_DTLS_CLOSED event reported in coap_session_disconnected_lkd() */
4089 if (session->dtls_event != COAP_EVENT_DTLS_CLOSED)
4090 coap_handle_event_lkd(session->context, session->dtls_event, session);
4091 if (session->dtls_event == COAP_EVENT_DTLS_ERROR ||
4092 session->dtls_event == COAP_EVENT_DTLS_CLOSED) {
4094 r = -1;
4095 }
4096 }
4097
4098 if (r >= 0) {
4099 if (r == (ssize_t)data_len)
4100 coap_log_debug("* %s: tls: sent %4d bytes\n",
4101 coap_session_str(session), r);
4102 else
4103 coap_log_debug("* %s: tls: sent %4d of %4zd bytes\n",
4104 coap_session_str(session), r, data_len);
4105 }
4106 return r;
4107}
4108
4109/*
4110 * strm
4111 * return >=0 Number of bytes read.
4112 * -1 Error (error in errno).
4113 */
4114ssize_t
4115coap_tls_read(coap_session_t *session, uint8_t *data, size_t data_len) {
4116 SSL *ssl = (SSL *)session->tls;
4117 int r, in_init;
4118
4119 if (ssl == NULL) {
4120 errno = ENXIO;
4121 return -1;
4122 }
4123
4124 in_init = !SSL_is_init_finished(ssl);
4125 session->dtls_event = -1;
4126 ERR_clear_error();
4127 r = SSL_read(ssl, data, (int)data_len);
4128 if (r <= 0) {
4129 int err = SSL_get_error(ssl, r);
4130 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
4131 if (in_init && SSL_is_init_finished(ssl)) {
4132 coap_dtls_log(COAP_LOG_INFO, "* %s: Using cipher: %s\n",
4133 coap_session_str(session), SSL_get_cipher_name(ssl));
4135 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
4136 }
4137 if (err == SSL_ERROR_WANT_READ)
4138 session->sock.flags |= COAP_SOCKET_WANT_READ;
4139 if (err == SSL_ERROR_WANT_WRITE) {
4140 session->sock.flags |= COAP_SOCKET_WANT_WRITE;
4141#ifdef COAP_EPOLL_SUPPORT
4142 coap_epoll_ctl_mod(&session->sock,
4143 EPOLLOUT |
4144 ((session->sock.flags & COAP_SOCKET_WANT_READ) ?
4145 EPOLLIN : 0),
4146 __func__);
4147#endif /* COAP_EPOLL_SUPPORT */
4148 }
4149 r = 0;
4150 } else {
4151 if (err == SSL_ERROR_ZERO_RETURN) /* Got a close notify alert from the remote side */
4153 else if (err == SSL_ERROR_SSL) {
4154 unsigned long e = ERR_get_error();
4155
4156 coap_log_info("***%s: coap_tls_read: cannot recv PDU: %d: %s\n",
4157 coap_session_str(session),
4158 ERR_GET_REASON(e), ERR_reason_error_string(e));
4160 } else {
4161 coap_log_info("***%s: coap_tls_read: cannot read PDU %d\n",
4162 coap_session_str(session), err);
4163 }
4164 r = -1;
4165 }
4166 } else if (in_init && SSL_is_init_finished(ssl)) {
4167 coap_dtls_log(COAP_LOG_INFO, "* %s: Using cipher: %s\n",
4168 coap_session_str(session), SSL_get_cipher_name(ssl));
4170 session->sock.lfunc[COAP_LAYER_TLS].l_establish(session);
4171 }
4172
4173 if (session->dtls_event >= 0) {
4174 /* COAP_EVENT_DTLS_CLOSED event reported in coap_session_disconnected_lkd() */
4175 if (session->dtls_event != COAP_EVENT_DTLS_CLOSED)
4176 coap_handle_event_lkd(session->context, session->dtls_event, session);
4177 if (session->dtls_event == COAP_EVENT_DTLS_ERROR ||
4178 session->dtls_event == COAP_EVENT_DTLS_CLOSED) {
4180 r = -1;
4181 }
4182 }
4183
4184 if (r > 0) {
4185 coap_log_debug("* %s: tls: recv %4d bytes\n",
4186 coap_session_str(session), r);
4187 }
4188 return r;
4189}
4190#endif /* !COAP_DISABLE_TCP */
4191
4192#if COAP_SERVER_SUPPORT
4194coap_digest_setup(void) {
4195 EVP_MD_CTX *digest_ctx = EVP_MD_CTX_new();
4196
4197 if (digest_ctx) {
4198 EVP_DigestInit_ex(digest_ctx, EVP_sha256(), NULL);
4199 }
4200 return digest_ctx;
4201}
4202
4203void
4205 if (digest_ctx)
4206 EVP_MD_CTX_free(digest_ctx);
4207}
4208
4209int
4211 const uint8_t *data,
4212 size_t data_len) {
4213 return EVP_DigestUpdate(digest_ctx, data, data_len);
4214}
4215
4216int
4218 coap_digest_t *digest_buffer) {
4219 unsigned int size = sizeof(coap_digest_t);
4220 int ret = EVP_DigestFinal_ex(digest_ctx, (uint8_t *)digest_buffer, &size);
4221
4222 coap_digest_free(digest_ctx);
4223 return ret;
4224}
4225#endif /* COAP_SERVER_SUPPORT */
4226
4227#if COAP_WS_SUPPORT || COAP_OSCORE_SUPPORT
4228static void
4229coap_crypto_output_errors(const char *prefix) {
4230#if COAP_MAX_LOGGING_LEVEL < _COAP_LOG_WARN
4231 (void)prefix;
4232#else /* COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_WARN */
4233 unsigned long e;
4234
4235 while ((e = ERR_get_error()))
4236 coap_log_warn("%s: %s%s\n",
4237 prefix,
4238 ERR_reason_error_string(e),
4239 ssl_function_definition(e));
4240#endif /* COAP_MAX_LOGGING_LEVEL >= _COAP_LOG_WARN */
4241}
4242#endif /* COAP_WS_SUPPORT || COAP_OSCORE_SUPPORT */
4243
4244#if COAP_WS_SUPPORT
4245/*
4246 * The struct hash_algs and the function get_hash_alg() are used to
4247 * determine which hash type to use for creating the required hash object.
4248 */
4249static struct hash_algs {
4250 cose_alg_t alg;
4251 const EVP_MD *(*get_hash)(void);
4252 size_t length; /* in bytes */
4253} hashs[] = {
4254 {COSE_ALGORITHM_SHA_1, EVP_sha1, 20},
4255 {COSE_ALGORITHM_SHA_256_64, EVP_sha256, 8},
4256 {COSE_ALGORITHM_SHA_256_256, EVP_sha256, 32},
4257 {COSE_ALGORITHM_SHA_512, EVP_sha512, 64},
4258};
4259
4260static const EVP_MD *
4261get_hash_alg(cose_alg_t alg, size_t *length) {
4262 size_t idx;
4263
4264 for (idx = 0; idx < sizeof(hashs) / sizeof(struct hash_algs); idx++) {
4265 if (hashs[idx].alg == alg) {
4266 *length = hashs[idx].length;
4267 return hashs[idx].get_hash();
4268 }
4269 }
4270 coap_log_debug("get_hash_alg: COSE hash %d not supported\n", alg);
4271 return NULL;
4272}
4273
4274int
4276 const coap_bin_const_t *data,
4277 coap_bin_const_t **hash) {
4278 unsigned int length;
4279 const EVP_MD *evp_md;
4280 EVP_MD_CTX *evp_ctx = NULL;
4281 coap_binary_t *dummy = NULL;
4282 size_t hash_length;
4283
4284 if ((evp_md = get_hash_alg(alg, &hash_length)) == NULL) {
4285 coap_log_debug("coap_crypto_hash: algorithm %d not supported\n", alg);
4286 return 0;
4287 }
4288 evp_ctx = EVP_MD_CTX_new();
4289 if (evp_ctx == NULL)
4290 goto error;
4291 if (EVP_DigestInit_ex(evp_ctx, evp_md, NULL) == 0)
4292 goto error;
4293 ;
4294 if (EVP_DigestUpdate(evp_ctx, data->s, data->length) == 0)
4295 goto error;
4296 ;
4297 dummy = coap_new_binary(EVP_MAX_MD_SIZE);
4298 if (dummy == NULL)
4299 goto error;
4300 if (EVP_DigestFinal_ex(evp_ctx, dummy->s, &length) == 0)
4301 goto error;
4302 dummy->length = length;
4303 if (hash_length < dummy->length)
4304 dummy->length = hash_length;
4305 *hash = (coap_bin_const_t *)(dummy);
4306 EVP_MD_CTX_free(evp_ctx);
4307 return 1;
4308
4309error:
4310 coap_crypto_output_errors("coap_crypto_hash");
4312 if (evp_ctx)
4313 EVP_MD_CTX_free(evp_ctx);
4314 return 0;
4315}
4316#endif /* COAP_WS_SUPPORT */
4317
4318#if COAP_OSCORE_SUPPORT
4319int
4321 return 1;
4322}
4323
4324#include <openssl/evp.h>
4325#include <openssl/hmac.h>
4326
4327/*
4328 * The struct cipher_algs and the function get_cipher_alg() are used to
4329 * determine which cipher type to use for creating the required cipher
4330 * suite object.
4331 */
4332static struct cipher_algs {
4333 cose_alg_t alg;
4334 const EVP_CIPHER *(*get_cipher)(void);
4335} ciphers[] = {{COSE_ALGORITHM_AES_CCM_16_64_128, EVP_aes_128_ccm},
4336 {COSE_ALGORITHM_AES_CCM_16_64_256, EVP_aes_256_ccm}
4337};
4338
4339static const EVP_CIPHER *
4340get_cipher_alg(cose_alg_t alg) {
4341 size_t idx;
4342
4343 for (idx = 0; idx < sizeof(ciphers) / sizeof(struct cipher_algs); idx++) {
4344 if (ciphers[idx].alg == alg)
4345 return ciphers[idx].get_cipher();
4346 }
4347 coap_log_debug("get_cipher_alg: COSE cipher %d not supported\n", alg);
4348 return NULL;
4349}
4350
4351/*
4352 * The struct hmac_algs and the function get_hmac_alg() are used to
4353 * determine which hmac type to use for creating the required hmac
4354 * suite object.
4355 */
4356static struct hmac_algs {
4357 cose_hmac_alg_t hmac_alg;
4358 const EVP_MD *(*get_hmac)(void);
4359} hmacs[] = {
4360 {COSE_HMAC_ALG_HMAC256_256, EVP_sha256},
4361 {COSE_HMAC_ALG_HMAC384_384, EVP_sha384},
4362 {COSE_HMAC_ALG_HMAC512_512, EVP_sha512},
4363};
4364
4365static const EVP_MD *
4366get_hmac_alg(cose_hmac_alg_t hmac_alg) {
4367 size_t idx;
4368
4369 for (idx = 0; idx < sizeof(hmacs) / sizeof(struct hmac_algs); idx++) {
4370 if (hmacs[idx].hmac_alg == hmac_alg)
4371 return hmacs[idx].get_hmac();
4372 }
4373 coap_log_debug("get_hmac_alg: COSE HMAC %d not supported\n", hmac_alg);
4374 return NULL;
4375}
4376
4377int
4379 return get_cipher_alg(alg) != NULL;
4380}
4381
4382int
4384 cose_hmac_alg_t hmac_alg;
4385
4386 if (!cose_get_hmac_alg_for_hkdf(hkdf_alg, &hmac_alg))
4387 return 0;
4388 return get_hmac_alg(hmac_alg) != NULL;
4389}
4390
4391#define C(Func) \
4392 if (1 != (Func)) { \
4393 goto error; \
4394 }
4395
4396int
4398 coap_bin_const_t *data,
4399 coap_bin_const_t *aad,
4400 uint8_t *result,
4401 size_t *max_result_len) {
4402 const EVP_CIPHER *cipher;
4403 const coap_crypto_aes_ccm_t *ccm;
4404 int tmp;
4405 int result_len = (int)(*max_result_len & INT_MAX);
4406
4407 if (data == NULL)
4408 return 0;
4409
4410 assert(params != NULL);
4411 if (!params || ((cipher = get_cipher_alg(params->alg)) == NULL)) {
4412 return 0;
4413 }
4414
4415 /* TODO: set evp_md depending on params->alg */
4416 ccm = &params->params.aes;
4417
4418 EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
4419
4420 /* EVP_CIPHER_CTX_init(ctx); */
4421 C(EVP_EncryptInit_ex(ctx, cipher, NULL, NULL, NULL));
4422 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_CCM_SET_L, (int)ccm->l, NULL));
4423 C(EVP_CIPHER_CTX_ctrl(ctx,
4424 EVP_CTRL_AEAD_SET_IVLEN,
4425 (int)(15 - ccm->l),
4426 NULL));
4427 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, (int)ccm->tag_len, NULL));
4428 C(EVP_EncryptInit_ex(ctx, NULL, NULL, ccm->key.s, ccm->nonce));
4429 /* C(EVP_CIPHER_CTX_set_padding(ctx, 0)); */
4430
4431 C(EVP_EncryptUpdate(ctx, NULL, &result_len, NULL, (int)data->length));
4432 if (aad && aad->s && (aad->length > 0)) {
4433 C(EVP_EncryptUpdate(ctx, NULL, &result_len, aad->s, (int)aad->length));
4434 }
4435 C(EVP_EncryptUpdate(ctx, result, &result_len, data->s, (int)data->length));
4436 /* C(EVP_EncryptFinal_ex(ctx, result + result_len, &tmp)); */
4437 tmp = result_len;
4438 C(EVP_EncryptFinal_ex(ctx, result + result_len, &tmp));
4439 result_len += tmp;
4440
4441 /* retrieve the tag */
4442 C(EVP_CIPHER_CTX_ctrl(ctx,
4443 EVP_CTRL_CCM_GET_TAG,
4444 (int)ccm->tag_len,
4445 result + result_len));
4446
4447 *max_result_len = result_len + ccm->tag_len;
4448 EVP_CIPHER_CTX_free(ctx);
4449 return 1;
4450
4451error:
4452 coap_crypto_output_errors("coap_crypto_aead_encrypt");
4453 return 0;
4454}
4455
4456int
4458 coap_bin_const_t *data,
4459 coap_bin_const_t *aad,
4460 uint8_t *result,
4461 size_t *max_result_len) {
4462 const EVP_CIPHER *cipher;
4463 const coap_crypto_aes_ccm_t *ccm;
4464 int tmp;
4465 int len;
4466 const uint8_t *tag;
4467 uint8_t *rwtag;
4468
4469 if (data == NULL)
4470 return 0;
4471
4472 assert(params != NULL);
4473 if (!params || ((cipher = get_cipher_alg(params->alg)) == NULL)) {
4474 return 0;
4475 }
4476
4477 ccm = &params->params.aes;
4478
4479 if (data->length < ccm->tag_len) {
4480 return 0;
4481 } else {
4482 tag = data->s + data->length - ccm->tag_len;
4483 data->length -= ccm->tag_len;
4484 /* Kludge to stop compiler warning */
4485 memcpy(&rwtag, &tag, sizeof(rwtag));
4486 }
4487
4488 EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
4489
4490 C(EVP_DecryptInit_ex(ctx, cipher, NULL, NULL, NULL));
4491 C(EVP_CIPHER_CTX_ctrl(ctx,
4492 EVP_CTRL_AEAD_SET_IVLEN,
4493 (int)(15 - ccm->l),
4494 NULL));
4495 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, (int)ccm->tag_len, rwtag));
4496 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_CCM_SET_L, (int)ccm->l, NULL));
4497 /* C(EVP_CIPHER_CTX_set_padding(ctx, 0)); */
4498 C(EVP_DecryptInit_ex(ctx, NULL, NULL, ccm->key.s, ccm->nonce));
4499
4500 C(EVP_DecryptUpdate(ctx, NULL, &len, NULL, (int)data->length));
4501 if (aad && aad->s && (aad->length > 0)) {
4502 C(EVP_DecryptUpdate(ctx, NULL, &len, aad->s, (int)aad->length));
4503 }
4504 tmp = EVP_DecryptUpdate(ctx, result, &len, data->s, (int)data->length);
4505 EVP_CIPHER_CTX_free(ctx);
4506 if (tmp <= 0) {
4507 *max_result_len = 0;
4508 return 0;
4509 }
4510 *max_result_len = len;
4511 return 1;
4512
4513error:
4514 coap_crypto_output_errors("coap_crypto_aead_decrypt");
4515 return 0;
4516}
4517
4518int
4520 coap_bin_const_t *key,
4521 coap_bin_const_t *data,
4522 coap_bin_const_t **hmac) {
4523 unsigned int result_len;
4524 const EVP_MD *evp_md;
4525 coap_binary_t *dummy = NULL;
4526
4527 assert(key);
4528 assert(data);
4529 assert(hmac);
4530
4531 if ((evp_md = get_hmac_alg(hmac_alg)) == 0) {
4532 coap_log_debug("coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
4533 return 0;
4534 }
4535 dummy = coap_new_binary(EVP_MAX_MD_SIZE);
4536 if (dummy == NULL)
4537 return 0;
4538 result_len = (unsigned int)dummy->length;
4539 if (HMAC(evp_md,
4540 key->s,
4541 (int)key->length,
4542 data->s,
4543 (int)data->length,
4544 dummy->s,
4545 &result_len)) {
4546 dummy->length = result_len;
4547 *hmac = (coap_bin_const_t *)dummy;
4548 return 1;
4549 }
4550
4551 coap_crypto_output_errors("coap_crypto_hmac");
4552 return 0;
4553}
4554
4555#endif /* COAP_OSCORE_SUPPORT */
4556
4557#else /* !COAP_WITH_LIBOPENSSL */
4558
4559#ifdef __clang__
4560/* Make compilers happy that do not like empty modules. As this function is
4561 * never used, we ignore -Wunused-function at the end of compiling this file
4562 */
4563#pragma GCC diagnostic ignored "-Wunused-function"
4564#endif
4565static inline void
4566dummy(void) {
4567}
4568
4569#endif /* COAP_WITH_LIBOPENSSL */
#define COAP_RXBUFFER_SIZE
Definition coap_io.h:29
@ COAP_NACK_TLS_FAILED
Definition coap_io.h:66
#define COAP_SOCKET_WANT_READ
non blocking socket is waiting for reading
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
void coap_epoll_ctl_mod(coap_socket_t *sock, uint32_t events, const char *func)
Epoll specific function to modify the state of events that epoll is tracking on the appropriate file ...
@ COAP_LAYER_TLS
Library specific build wrapper for coap_internal.h.
@ COAP_STRING
Definition coap_mem.h:39
void * coap_malloc_type(coap_memory_tag_t type, size_t size)
Allocates a chunk of size bytes and returns a pointer to the newly allocated memory.
void coap_free_type(coap_memory_tag_t type, void *p)
Releases the memory that was allocated by coap_malloc_type().
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
Definition coap_notls.c:108
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
Definition coap_notls.c:229
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
Definition coap_notls.c:301
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
Definition coap_notls.c:224
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
Definition coap_notls.c:243
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
Definition coap_notls.c:158
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
Definition coap_notls.c:261
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
Definition coap_notls.c:124
static coap_log_t dtls_log_level
Definition coap_notls.c:151
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
Definition coap_notls.c:147
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
Definition coap_notls.c:212
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
Definition coap_notls.c:289
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
Definition coap_notls.c:208
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
Definition coap_notls.c:116
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
Definition coap_notls.c:238
void coap_dtls_free_context(void *handle COAP_UNUSED)
Definition coap_notls.c:186
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
Definition coap_notls.c:204
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
Definition coap_notls.c:181
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
Definition coap_notls.c:280
static void dummy(void)
void coap_digest_free(coap_digest_ctx_t *digest_ctx)
Free off coap_digest_ctx_t.
int coap_digest_final(coap_digest_ctx_t *digest_ctx, coap_digest_t *digest_buffer)
Finalize the coap_digest information into the provided digest_buffer.
int coap_digest_update(coap_digest_ctx_t *digest_ctx, const uint8_t *data, size_t data_len)
Update the coap_digest information with the next chunk of data.
void coap_digest_ctx_t
coap_digest_ctx_t * coap_digest_setup(void)
Initialize a coap_digest.
coap_tick_t coap_ticks_from_rt_us(uint64_t t)
Helper function that converts POSIX wallclock time in us to coap ticks.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
Definition coap_time.h:143
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
Definition coap_prng.c:178
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
Definition coap_net.c:4707
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
Definition coap_net.c:2746
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
void * coap_tls_new_server_session(coap_session_t *coap_session)
Create a TLS new server-side session.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
Definition coap_notls.c:154
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
Definition coap_dtls.c:165
void * coap_dtls_new_client_session(coap_session_t *coap_session)
Create a new client-side session.
void * coap_dtls_new_server_session(coap_session_t *coap_session)
Create a new DTLS server-side session.
int coap_dtls_hello(coap_session_t *coap_session, const uint8_t *data, size_t data_len)
Handling client HELLO messages from a new candiate peer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
Definition coap_notls.c:219
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
int coap_dtls_context_set_spsk(coap_context_t *coap_context, coap_dtls_spsk_t *setup_data)
Set the DTLS context's default server PSK information.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
Definition coap_notls.c:166
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
void * coap_tls_new_client_session(coap_session_t *coap_session)
Create a new TLS client-side session.
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
Definition coap_dtls.c:26
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
const coap_bin_const_t * coap_get_session_server_psk_hint(const coap_session_t *coap_session)
Get the current server's PSK identity hint.
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_KEY_CA
@ COAP_DEFINE_KEY_PUBLIC
@ COAP_DEFINE_FAIL_NONE
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
@ COAP_DEFINE_FAIL_BAD
#define COAP_DTLS_HINT_LENGTH
Definition coap_dtls.h:35
int coap_tls_engine_configure(coap_str_const_t *conf_mem)
Configure an ENGINE for a TLS library.
Definition coap_notls.c:22
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
Definition coap_notls.c:100
coap_dtls_role_t
Definition coap_dtls.h:44
int coap_tls_engine_remove(void)
Remove a previously configured ENGINE from a TLS library.
Definition coap_notls.c:28
coap_tls_library_t
Definition coap_dtls.h:70
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
Definition coap_dtls.h:245
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
Definition coap_dtls.h:242
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
Definition coap_dtls.h:236
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
Definition coap_dtls.h:234
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
Definition coap_dtls.h:251
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
Definition coap_dtls.h:238
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
Definition coap_dtls.h:240
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
Definition coap_dtls.h:248
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
Definition coap_dtls.h:46
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
Definition coap_dtls.h:45
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
Definition coap_dtls.h:172
@ COAP_ASN1_PKEY_DH
DH type.
Definition coap_dtls.h:155
@ COAP_ASN1_PKEY_NONE
NONE.
Definition coap_dtls.h:147
@ COAP_ASN1_PKEY_TLS1_PRF
TLS1_PRF type.
Definition coap_dtls.h:160
@ COAP_ASN1_PKEY_RSA2
RSA2 type.
Definition coap_dtls.h:149
@ COAP_ASN1_PKEY_DSA
DSA type.
Definition coap_dtls.h:150
@ COAP_ASN1_PKEY_DHX
DHX type.
Definition coap_dtls.h:156
@ COAP_ASN1_PKEY_DSA4
DSA4 type.
Definition coap_dtls.h:154
@ COAP_ASN1_PKEY_DSA2
DSA2 type.
Definition coap_dtls.h:152
@ COAP_ASN1_PKEY_RSA
RSA type.
Definition coap_dtls.h:148
@ COAP_ASN1_PKEY_DSA1
DSA1 type.
Definition coap_dtls.h:151
@ COAP_ASN1_PKEY_HKDF
HKDF type.
Definition coap_dtls.h:161
@ COAP_ASN1_PKEY_EC
EC type.
Definition coap_dtls.h:157
@ COAP_ASN1_PKEY_DSA3
DSA3 type.
Definition coap_dtls.h:153
@ COAP_ASN1_PKEY_HMAC
HMAC type.
Definition coap_dtls.h:158
@ COAP_ASN1_PKEY_CMAC
CMAC type.
Definition coap_dtls.h:159
@ COAP_TLS_LIBRARY_OPENSSL
Using OpenSSL library.
Definition coap_dtls.h:73
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
Definition coap_event.h:39
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
Definition coap_event.h:41
@ COAP_EVENT_DTLS_RENEGOTIATE
Triggered when (D)TLS session renegotiated.
Definition coap_event.h:43
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
Definition coap_event.h:45
#define coap_lock_callback_ret(r, c, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
Definition coap_debug.h:120
coap_log_t
Logging type.
Definition coap_debug.h:50
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
Definition coap_notls.c:176
#define coap_dtls_log(level,...)
Logging function.
Definition coap_debug.h:300
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
Definition coap_notls.c:171
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
Definition coap_debug.h:108
#define coap_log_warn(...)
Definition coap_debug.h:102
#define coap_log_err(...)
Definition coap_debug.h:96
#define coap_log(level,...)
Logging function.
Definition coap_debug.h:284
@ COAP_LOG_INFO
Definition coap_debug.h:57
@ COAP_LOG_EMERG
Definition coap_debug.h:51
@ COAP_LOG_DEBUG
Definition coap_debug.h:58
@ COAP_LOG_WARN
Definition coap_debug.h:55
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
Definition coap_netif.c:25
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
cose_hkdf_alg_t
cose_hmac_alg_t
cose_alg_t
@ COSE_HMAC_ALG_HMAC384_384
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_HMAC_ALG_HMAC512_512
@ COSE_ALGORITHM_SHA_256_64
@ COSE_ALGORITHM_SHA_256_256
@ COSE_ALGORITHM_SHA_1
@ COSE_ALGORITHM_AES_CCM_16_64_128
@ COSE_ALGORITHM_SHA_512
@ COSE_ALGORITHM_AES_CCM_16_64_256
#define COAP_DEFAULT_MTU
Definition coap_pdu.h:41
@ COAP_PROTO_DTLS
Definition coap_pdu.h:315
@ COAP_PROTO_TLS
Definition coap_pdu.h:317
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
@ COAP_SESSION_STATE_HANDSHAKE
@ COAP_SESSION_STATE_CSM
void coap_delete_str_const(coap_str_const_t *s)
Deletes the given const string and releases any memory allocated.
Definition coap_str.c:61
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
Definition coap_str.c:77
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
Definition coap_str.c:105
coap_str_const_t * coap_new_str_const(const uint8_t *data, size_t size)
Returns a new const string object with at least size+1 bytes storage allocated, and the provided data...
Definition coap_str.c:51
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
Definition coap_notls.c:86
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
Definition coap_notls.c:50
int coap_tls_is_supported(void)
Check whether TLS is available.
Definition coap_notls.c:41
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
Definition coap_notls.c:36
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
Definition coap_notls.c:59
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
Definition coap_notls.c:77
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
Definition coap_notls.c:68
#define COAP_UNUSED
Definition libcoap.h:70
CoAP binary data definition with const data.
Definition coap_str.h:64
size_t length
length of binary data
Definition coap_str.h:65
const uint8_t * s
read-only binary data
Definition coap_str.h:66
CoAP binary data definition.
Definition coap_str.h:56
The CoAP stack's global state is stored in a coap_context_t object.
coap_dtls_spsk_t spsk_setup_data
Contains the initial PSK server setup data.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
cose_alg_t alg
The COSE algorith to use.
The structure that holds the Client PSK information.
Definition coap_dtls.h:379
coap_bin_const_t key
Definition coap_dtls.h:381
coap_bin_const_t identity
Definition coap_dtls.h:380
The structure used for defining the Client PSK setup data to be used.
Definition coap_dtls.h:410
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
Definition coap_dtls.h:417
void * ih_call_back_arg
Passed in to the Identity Hint callback function.
Definition coap_dtls.h:434
char * client_sni
If not NULL, SNI to use in client TLS setup.
Definition coap_dtls.h:437
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
Definition coap_dtls.h:433
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
Definition coap_dtls.h:415
The structure that holds the PKI key information.
Definition coap_dtls.h:279
coap_pki_key_define_t define
for definable type keys
Definition coap_dtls.h:286
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
Definition coap_dtls.h:280
The structure used for defining the PKI setup data to be used.
Definition coap_dtls.h:312
uint8_t allow_no_crl
1 ignore if CRL not there
Definition coap_dtls.h:326
void * cn_call_back_arg
Passed in to the CN callback function.
Definition coap_dtls.h:351
uint8_t cert_chain_validation
1 if to check cert_chain_verify_depth
Definition coap_dtls.h:323
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
Definition coap_dtls.h:333
uint8_t check_cert_revocation
1 if revocation checks wanted
Definition coap_dtls.h:325
coap_dtls_pki_sni_callback_t validate_sni_call_back
SNI check callback function.
Definition coap_dtls.h:358
uint8_t cert_chain_verify_depth
recommended depth is 3
Definition coap_dtls.h:324
coap_dtls_security_setup_t additional_tls_setup_call_back
Additional Security callback handler that is invoked when libcoap has done the standard,...
Definition coap_dtls.h:366
uint8_t allow_expired_certs
1 if expired certs are allowed
Definition coap_dtls.h:322
uint8_t verify_peer_cert
Set to COAP_DTLS_PKI_SETUP_VERSION to support this version of the struct.
Definition coap_dtls.h:317
char * client_sni
If not NULL, SNI to use in client TLS setup.
Definition coap_dtls.h:368
uint8_t allow_self_signed
1 if self-signed certs are allowed.
Definition coap_dtls.h:320
void * sni_call_back_arg
Passed in to the sni callback function.
Definition coap_dtls.h:359
coap_dtls_cn_callback_t validate_cn_call_back
CN check callback function.
Definition coap_dtls.h:350
uint8_t allow_expired_crl
1 if expired crl is allowed
Definition coap_dtls.h:327
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
Definition coap_dtls.h:330
uint8_t check_common_ca
1 if peer cert is to be signed by the same CA as the local cert
Definition coap_dtls.h:318
coap_dtls_key_t pki_key
PKI key definition.
Definition coap_dtls.h:373
The structure that holds the Server Pre-Shared Key and Identity Hint information.
Definition coap_dtls.h:450
coap_bin_const_t hint
Definition coap_dtls.h:451
coap_bin_const_t key
Definition coap_dtls.h:452
The structure used for defining the Server PSK setup data to be used.
Definition coap_dtls.h:501
coap_dtls_psk_sni_callback_t validate_sni_call_back
SNI check callback function.
Definition coap_dtls.h:530
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
Definition coap_dtls.h:522
void * id_call_back_arg
Passed in to the Identity callback function.
Definition coap_dtls.h:523
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
Definition coap_dtls.h:506
void * sni_call_back_arg
Passed in to the SNI callback function.
Definition coap_dtls.h:531
coap_dtls_spsk_info_t psk_info
Server PSK definition.
Definition coap_dtls.h:533
coap_layer_read_t l_read
coap_layer_write_t l_write
coap_layer_establish_t l_establish
coap_const_char_ptr_t public_cert
define: Public Cert
Definition coap_dtls.h:261
coap_asn1_privatekey_type_t private_key_type
define: ASN1 Private Key Type (if needed)
Definition coap_dtls.h:269
const char * user_pin
define: User pin to access type PKCS11.
Definition coap_dtls.h:271
coap_const_char_ptr_t private_key
define: Private Key
Definition coap_dtls.h:262
coap_const_char_ptr_t ca
define: Common CA Certificate
Definition coap_dtls.h:260
size_t public_cert_len
define Public Cert length (if needed)
Definition coap_dtls.h:264
size_t ca_len
define CA Cert length (if needed)
Definition coap_dtls.h:263
coap_pki_define_t private_key_def
define: Private Key type definition
Definition coap_dtls.h:268
size_t private_key_len
define Private Key length (if needed)
Definition coap_dtls.h:265
coap_pki_define_t ca_def
define: Common CA type definition
Definition coap_dtls.h:266
coap_pki_define_t public_cert_def
define: Public Cert type definition
Definition coap_dtls.h:267
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
unsigned int dtls_timeout_count
dtls setup retry counter
coap_bin_const_t * psk_key
If client, this field contains the current pre-shared key for server; When this field is NULL,...
coap_socket_t sock
socket object for the session, if any
coap_session_state_t state
current state of relationship with peer
coap_proto_t proto
protocol used
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_context_t * context
session's context
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
CoAP string data definition with const data.
Definition coap_str.h:46
const uint8_t * s
read-only string data
Definition coap_str.h:48
size_t length
length of string
Definition coap_str.h:47
The structure used for returning the underlying (D)TLS library information.
Definition coap_dtls.h:83
uint64_t built_version
(D)TLS Built against Library Version
Definition coap_dtls.h:86
coap_tls_library_t type
Library type.
Definition coap_dtls.h:85
uint64_t version
(D)TLS runtime Library Version
Definition coap_dtls.h:84
const char * s_byte
signed char ptr
Definition coap_str.h:73
const uint8_t * u_byte
unsigned char ptr
Definition coap_str.h:74