37#if COAP_WITH_LIBMBEDTLS
53#include <mbedtls/version.h>
56#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
57#define MBEDTLS_2_X_COMPAT
60#ifndef MBEDTLS_ALLOW_PRIVATE_ACCESS
61#define MBEDTLS_ALLOW_PRIVATE_ACCESS
65#include <mbedtls/platform.h>
66#include <mbedtls/net_sockets.h>
67#include <mbedtls/ssl.h>
68#include <mbedtls/entropy.h>
69#include <mbedtls/ctr_drbg.h>
70#include <mbedtls/error.h>
71#include <mbedtls/timing.h>
72#include <mbedtls/ssl_cookie.h>
73#include <mbedtls/oid.h>
74#include <mbedtls/debug.h>
75#include <mbedtls/sha256.h>
76#if defined(ESPIDF_VERSION) && defined(CONFIG_MBEDTLS_DEBUG)
77#include <mbedtls/esp_debug.h>
79#if defined(MBEDTLS_PSA_CRYPTO_C)
80#include <psa/crypto.h>
87strndup(
const char *s1,
size_t n) {
88 char *copy = (
char *)malloc(n + 1);
97#define mbedtls_malloc(a) malloc(a)
98#define mbedtls_realloc(a,b) realloc(a,b)
99#define mbedtls_strdup(a) strdup(a)
100#define mbedtls_strndup(a,b) strndup(a,b)
102#define mbedtls_free(a) free(a)
104#ifndef MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED
106#ifdef MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
107#define MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED
111#if ! COAP_SERVER_SUPPORT
112#undef MBEDTLS_SSL_SRV_C
114#if ! COAP_CLIENT_SUPPORT
115#undef MBEDTLS_SSL_CLI_C
119#define strcasecmp _stricmp
122#define IS_PSK (1 << 0)
123#define IS_PKI (1 << 1)
124#define IS_CLIENT (1 << 6)
125#define IS_SERVER (1 << 7)
127typedef struct coap_ssl_t {
138typedef struct coap_mbedtls_env_t {
139 mbedtls_ssl_context ssl;
140 mbedtls_entropy_context entropy;
141 mbedtls_ctr_drbg_context ctr_drbg;
142 mbedtls_ssl_config conf;
143 mbedtls_timing_delay_context timer;
144 mbedtls_x509_crt cacert;
145 mbedtls_x509_crt public_cert;
146 mbedtls_pk_context private_key;
147 mbedtls_ssl_cookie_ctx cookie_ctx;
151 int seen_client_hello;
154 unsigned int retry_scalar;
155 coap_ssl_t coap_ssl_data;
156 uint32_t server_hello_cnt;
159typedef struct pki_sni_entry {
162 mbedtls_x509_crt cacert;
163 mbedtls_x509_crt public_cert;
164 mbedtls_pk_context private_key;
167typedef struct psk_sni_entry {
172typedef struct coap_mbedtls_context_t {
174 size_t pki_sni_count;
175 pki_sni_entry *pki_sni_entry_list;
176 size_t psk_sni_count;
177 psk_sni_entry *psk_sni_entry_list;
180 int trust_store_defined;
182} coap_mbedtls_context_t;
184typedef enum coap_enc_method_t {
196} zephyr_timing_delay_context;
199zephyr_timing_set_delay(
void *data, uint32_t int_ms, uint32_t fin_ms) {
200 zephyr_timing_delay_context *ctx = (zephyr_timing_delay_context *)data;
206 ctx->start_time = k_uptime_get_32();
209 ctx->int_time = ctx->start_time + int_ms;
210 ctx->fin_time = ctx->start_time + fin_ms;
218zephyr_timing_get_delay(
void *data) {
219 zephyr_timing_delay_context *ctx = (zephyr_timing_delay_context *)data;
222 if (ctx == NULL || ctx->fin_time == 0) {
226 now = k_uptime_get_32();
228 if (now >= ctx->fin_time) {
232 if (now >= ctx->int_time) {
241#ifndef MBEDTLS_2_X_COMPAT
246coap_rng(
void *ctx
COAP_UNUSED,
unsigned char *buf,
size_t len) {
247 return coap_prng_lkd(buf, len) ? 0 : MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED;
252coap_dgram_read(
void *ctx,
unsigned char *out,
size_t outl) {
257 if (!c_session->
tls) {
259 return MBEDTLS_ERR_SSL_WANT_READ;
261 data = &((coap_mbedtls_env_t *)c_session->
tls)->coap_ssl_data;
264 if (data->pdu_len > 0) {
265 if (outl < data->pdu_len) {
266 memcpy(out, data->pdu, outl);
269 data->pdu_len -= outl;
271 memcpy(out, data->pdu, data->pdu_len);
273 if (!data->peekmode) {
279 ret = MBEDTLS_ERR_SSL_WANT_READ;
293coap_dgram_write(
void *ctx,
const unsigned char *send_buffer,
294 size_t send_buffer_length) {
299 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
311 send_buffer, send_buffer_length);
312 if (result != (ssize_t)send_buffer_length) {
313 int keep_errno = errno;
316 result, send_buffer_length);
319 if (errno == ENOTCONN || errno == ECONNREFUSED)
328 m_env->last_timeout = now;
336#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) && defined(MBEDTLS_SSL_SRV_C)
341psk_server_callback(
void *p_info, mbedtls_ssl_context *ssl,
342 const unsigned char *identity,
size_t identity_len) {
345 coap_mbedtls_env_t *m_env;
349 if (c_session == NULL)
353 lidentity.
s = identity ? (
const uint8_t *)identity : (const uint8_t *)
"";
354 lidentity.
length = identity ? identity_len : 0;
358 (
int)lidentity.
length, (
const char *)lidentity.
s);
360 m_env = (coap_mbedtls_env_t *)c_session->
tls;
375 mbedtls_ssl_set_hs_psk(ssl, psk_key->
s, psk_key->
length);
376 m_env->seen_client_hello = 1;
382get_san_or_cn_from_cert(mbedtls_x509_crt *crt) {
384 const mbedtls_asn1_named_data *cn_data;
386 if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) {
387 mbedtls_asn1_sequence *seq = &crt->subject_alt_names;
388 while (seq && seq->buf.p == NULL) {
393 return mbedtls_strndup((
const char *)seq->buf.p,
398 cn_data = mbedtls_asn1_find_named_data(&crt->subject,
400 MBEDTLS_OID_SIZE(MBEDTLS_OID_AT_CN));
403 return mbedtls_strndup((
const char *)cn_data->val.p,
410#if COAP_MAX_LOGGING_LEVEL > 0
412get_error_string(
int ret) {
413 static char buf[128] = {0};
414 mbedtls_strerror(ret, buf,
sizeof(buf)-1);
420self_signed_cert_verify_callback_mbedtls(
void *data,
425 const coap_mbedtls_context_t *m_context =
429 if (*flags & MBEDTLS_X509_BADCERT_EXPIRED) {
431 *flags &= ~MBEDTLS_X509_BADCERT_EXPIRED;
442cert_verify_callback_mbedtls(
void *data, mbedtls_x509_crt *crt,
443 int depth, uint32_t *flags) {
445 coap_mbedtls_context_t *m_context =
453 cn = get_san_or_cn_from_cert(crt);
455 if (*flags & MBEDTLS_X509_BADCERT_EXPIRED) {
457 *flags &= ~MBEDTLS_X509_BADCERT_EXPIRED;
460 "The certificate has expired", cn ? cn :
"?", depth);
463 if (*flags & MBEDTLS_X509_BADCERT_FUTURE) {
465 *flags &= ~MBEDTLS_X509_BADCERT_FUTURE;
468 "The certificate has a future date", cn ? cn :
"?", depth);
471 if (*flags & MBEDTLS_X509_BADCERT_BAD_MD) {
473 *flags &= ~MBEDTLS_X509_BADCERT_BAD_MD;
476 "The certificate has a bad MD hash", cn ? cn :
"?", depth);
479 if (*flags & MBEDTLS_X509_BADCERT_BAD_KEY) {
481 *flags &= ~MBEDTLS_X509_BADCERT_BAD_KEY;
484 "The certificate has a short RSA length", cn ? cn :
"?", depth);
487 if (*flags & MBEDTLS_X509_BADCERT_NOT_TRUSTED) {
489 int self_signed = !mbedtls_x509_crt_verify(crt, crt, NULL, NULL, &lflags,
490 self_signed_cert_verify_callback_mbedtls,
492 if (self_signed && depth == 0) {
495 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
499 cn ? cn :
"?", depth);
501 }
else if (self_signed) {
503 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
506 "Self-signed", cn ? cn :
"?", depth);
510 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
513 "The certificate's CA is not trusted", cn ? cn :
"?", depth);
517 if (*flags & MBEDTLS_X509_BADCRL_EXPIRED) {
519 *flags &= ~MBEDTLS_X509_BADCRL_EXPIRED;
522 "The certificate's CRL has expired", cn ? cn :
"?", depth);
524 *flags &= ~MBEDTLS_X509_BADCRL_EXPIRED;
527 if (*flags & MBEDTLS_X509_BADCRL_FUTURE) {
529 *flags &= ~MBEDTLS_X509_BADCRL_FUTURE;
532 "The certificate's CRL has a future date", cn ? cn :
"?", depth);
534 *flags &= ~MBEDTLS_X509_BADCRL_FUTURE;
539 *flags |= MBEDTLS_X509_BADCERT_OTHER;
542 "The certificate's verify depth is too long",
543 cn ? cn :
"?", depth);
546 if (*flags & MBEDTLS_X509_BADCERT_CN_MISMATCH) {
547 *flags &= ~MBEDTLS_X509_BADCERT_CN_MISMATCH;
561 *flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH;
567 int ret = mbedtls_x509_crt_verify_info(buf,
sizeof(buf),
"", *flags);
570 tcp = strchr(buf,
'\n');
575 buf, *flags, cn ? cn :
"?", depth);
576 tcp = strchr(tcp+1,
'\n');
579 coap_log_err(
"mbedtls_x509_crt_verify_info returned -0x%x: '%s'\n",
580 -ret, get_error_string(ret));
591setup_pki_credentials(mbedtls_x509_crt *cacert,
592 mbedtls_x509_crt *public_cert,
593 mbedtls_pk_context *private_key,
594 coap_mbedtls_env_t *m_env,
595 coap_mbedtls_context_t *m_context,
601 int done_private_key = 0;
602 int done_public_cert = 0;
620#if defined(MBEDTLS_FS_IO)
621 mbedtls_pk_init(private_key);
622#ifdef MBEDTLS_2_X_COMPAT
623 ret = mbedtls_pk_parse_keyfile(private_key,
626 ret = mbedtls_pk_parse_keyfile(private_key,
628 NULL, coap_rng, (
void *)&m_env->ctr_drbg);
635 done_private_key = 1;
643 mbedtls_pk_init(private_key);
647 buffer = mbedtls_malloc(length + 1);
653 buffer[length] =
'\000';
655#ifdef MBEDTLS_2_X_COMPAT
656 ret = mbedtls_pk_parse_key(private_key, buffer, length, NULL, 0);
658 ret = mbedtls_pk_parse_key(private_key, buffer, length,
659 NULL, 0, coap_rng, (
void *)&m_env->ctr_drbg);
661 mbedtls_free(buffer);
663#ifdef MBEDTLS_2_X_COMPAT
664 ret = mbedtls_pk_parse_key(private_key,
668 ret = mbedtls_pk_parse_key(private_key,
671 NULL, 0, coap_rng, (
void *)&m_env->ctr_drbg);
679 done_private_key = 1;
682 mbedtls_pk_init(private_key);
683#ifdef MBEDTLS_2_X_COMPAT
684 ret = mbedtls_pk_parse_key(private_key,
688 ret = mbedtls_pk_parse_key(private_key,
691 (
void *)&m_env->ctr_drbg);
698 done_private_key = 1;
726#if defined(MBEDTLS_FS_IO)
727 mbedtls_x509_crt_init(public_cert);
728 ret = mbedtls_x509_crt_parse_file(public_cert,
735 done_public_cert = 1;
743 mbedtls_x509_crt_init(public_cert);
748 buffer = mbedtls_malloc(length + 1);
754 buffer[length] =
'\000';
756 ret = mbedtls_x509_crt_parse(public_cert, buffer, length);
757 mbedtls_free(buffer);
759 ret = mbedtls_x509_crt_parse(public_cert,
768 done_public_cert = 1;
775 mbedtls_x509_crt_init(public_cert);
776 ret = mbedtls_x509_crt_parse(public_cert,
784 done_public_cert = 1;
802 if (done_private_key && done_public_cert) {
803 ret = mbedtls_ssl_conf_own_cert(&m_env->conf, public_cert, private_key);
805 coap_log_err(
"mbedtls_ssl_conf_own_cert returned -0x%x: '%s'\n",
806 -ret, get_error_string(ret));
821#if defined(MBEDTLS_FS_IO)
822 mbedtls_x509_crt_init(cacert);
823 ret = mbedtls_x509_crt_parse_file(cacert,
830 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
838 mbedtls_x509_crt_init(cacert);
842 buffer = mbedtls_malloc(length + 1);
848 buffer[length] =
'\000';
850 ret = mbedtls_x509_crt_parse(cacert, buffer, length);
851 mbedtls_free(buffer);
853 ret = mbedtls_x509_crt_parse(cacert,
862 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
869 mbedtls_x509_crt_init(cacert);
870 ret = mbedtls_x509_crt_parse(cacert,
878 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
892#if defined(MBEDTLS_FS_IO)
893 if (m_context->root_ca_file) {
894 ret = mbedtls_x509_crt_parse_file(cacert, m_context->root_ca_file);
901 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
903 if (m_context->root_ca_path) {
904 ret = mbedtls_x509_crt_parse_path(cacert, m_context->root_ca_path);
911 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
913 if (m_context->trust_store_defined) {
915 const char *trust_list[] = {
916 "/etc/ssl/ca-bundle.pem",
917 "/etc/ssl/certs/ca-certificates.crt",
918 "/etc/pki/tls/cert.pem",
919 "/usr/local/share/certs/ca-root-nss.crt",
922 static const char *trust_file_found = NULL;
923 static int trust_file_done = 0;
926 if (trust_file_found) {
927 ret = mbedtls_x509_crt_parse_file(cacert, trust_file_found);
929 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
934 }
else if (!trust_file_done) {
936 for (i = 0; i <
sizeof(trust_list)/
sizeof(trust_list[0]); i++) {
937 ret = mbedtls_x509_crt_parse_file(cacert, trust_list[i]);
939 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
940 trust_file_found = trust_list[i];
944 if (i ==
sizeof(trust_list)/
sizeof(trust_list[0])) {
950 if (m_context->root_ca_file || m_context->root_ca_path ||
951 m_context->trust_store_defined) {
959#if defined(MBEDTLS_SSL_SRV_C)
960 mbedtls_ssl_conf_cert_req_ca_list(&m_env->conf,
962 MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED :
963 MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED);
966 MBEDTLS_SSL_VERIFY_REQUIRED :
967 MBEDTLS_SSL_VERIFY_NONE);
972 mbedtls_ssl_conf_verify(&m_env->conf,
973 cert_verify_callback_mbedtls, c_session);
978#if defined(MBEDTLS_SSL_SRV_C)
983pki_sni_callback(
void *p_info, mbedtls_ssl_context *ssl,
984 const unsigned char *uname,
size_t name_len) {
988 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
989 coap_mbedtls_context_t *m_context =
993 name = mbedtls_malloc(name_len+1);
997 memcpy(name, uname, name_len);
998 name[name_len] =
'\000';
1001 for (i = 0; i < m_context->pki_sni_count; i++) {
1002 if (strcasecmp(name, m_context->pki_sni_entry_list[i].sni) == 0) {
1006 if (i == m_context->pki_sni_count) {
1011 pki_sni_entry *pki_sni_entry_list;
1014 m_context->setup_data.validate_sni_call_back(name,
1015 m_context->setup_data.sni_call_back_arg));
1021 pki_sni_entry_list = mbedtls_realloc(m_context->pki_sni_entry_list,
1022 (i+1)*
sizeof(pki_sni_entry));
1024 if (pki_sni_entry_list == NULL) {
1028 m_context->pki_sni_entry_list = pki_sni_entry_list;
1029 memset(&m_context->pki_sni_entry_list[i], 0,
1030 sizeof(m_context->pki_sni_entry_list[i]));
1031 m_context->pki_sni_entry_list[i].sni = name;
1032 m_context->pki_sni_entry_list[i].pki_key = *new_entry;
1033 sni_setup_data = m_context->setup_data;
1034 sni_setup_data.pki_key = *new_entry;
1035 if (setup_pki_credentials(&m_context->pki_sni_entry_list[i].cacert,
1036 &m_context->pki_sni_entry_list[i].public_cert,
1037 &m_context->pki_sni_entry_list[i].private_key,
1046 m_context->pki_sni_count++;
1051 mbedtls_ssl_set_hs_ca_chain(ssl, &m_context->pki_sni_entry_list[i].cacert,
1053 return mbedtls_ssl_set_hs_own_cert(ssl,
1054 &m_context->pki_sni_entry_list[i].public_cert,
1055 &m_context->pki_sni_entry_list[i].private_key);
1058#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1063psk_sni_callback(
void *p_info, mbedtls_ssl_context *ssl,
1064 const unsigned char *uname,
size_t name_len) {
1067 coap_mbedtls_context_t *m_context =
1071 name = mbedtls_malloc(name_len+1);
1075 memcpy(name, uname, name_len);
1076 name[name_len] =
'\000';
1079 for (i = 0; i < m_context->psk_sni_count; i++) {
1080 if (strcasecmp(name, m_context->psk_sni_entry_list[i].sni) == 0) {
1084 if (i == m_context->psk_sni_count) {
1089 psk_sni_entry *psk_sni_entry_list;
1100 psk_sni_entry_list = mbedtls_realloc(m_context->psk_sni_entry_list,
1101 (i+1)*
sizeof(psk_sni_entry));
1103 if (psk_sni_entry_list == NULL) {
1107 m_context->psk_sni_entry_list = psk_sni_entry_list;
1108 m_context->psk_sni_entry_list[i].sni = name;
1109 m_context->psk_sni_entry_list[i].psk_info = *new_entry;
1111 m_context->psk_sni_count++;
1117 &m_context->psk_sni_entry_list[i].psk_info.hint);
1119 &m_context->psk_sni_entry_list[i].psk_info.key);
1120 return mbedtls_ssl_set_hs_psk(ssl,
1121 m_context->psk_sni_entry_list[i].psk_info.key.s,
1122 m_context->psk_sni_entry_list[i].psk_info.key.length);
1128 coap_mbedtls_env_t *m_env) {
1129 coap_mbedtls_context_t *m_context =
1132 m_context->psk_pki_enabled |= IS_SERVER;
1134 mbedtls_ssl_cookie_init(&m_env->cookie_ctx);
1135 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1136 MBEDTLS_SSL_IS_SERVER,
1138 MBEDTLS_SSL_TRANSPORT_DATAGRAM :
1139 MBEDTLS_SSL_TRANSPORT_STREAM,
1140 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
1141 coap_log_err(
"mbedtls_ssl_config_defaults returned -0x%x: '%s'\n",
1142 -ret, get_error_string(ret));
1146 mbedtls_ssl_conf_rng(&m_env->conf, mbedtls_ctr_drbg_random, &m_env->ctr_drbg);
1148#if defined(MBEDTLS_SSL_PROTO_DTLS)
1149 mbedtls_ssl_conf_handshake_timeout(&m_env->conf, COAP_DTLS_RETRANSMIT_MS,
1150 COAP_DTLS_RETRANSMIT_TOTAL_MS);
1153 if (m_context->psk_pki_enabled & IS_PSK) {
1154#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1155 mbedtls_ssl_conf_psk_cb(&m_env->conf, psk_server_callback, c_session);
1157 mbedtls_ssl_conf_sni(&m_env->conf, psk_sni_callback, c_session);
1159#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1167 if (m_context->psk_pki_enabled & IS_PKI) {
1168 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1169 &m_env->private_key, m_env, m_context,
1170 c_session, &m_context->setup_data,
1176 if (m_context->setup_data.validate_sni_call_back) {
1177 mbedtls_ssl_conf_sni(&m_env->conf, pki_sni_callback, c_session);
1181 if ((ret = mbedtls_ssl_cookie_setup(&m_env->cookie_ctx,
1182 mbedtls_ctr_drbg_random,
1183 &m_env->ctr_drbg)) != 0) {
1184 coap_log_err(
"mbedtls_ssl_cookie_setup: returned -0x%x: '%s'\n",
1185 -ret, get_error_string(ret));
1189#if defined(MBEDTLS_SSL_PROTO_DTLS)
1190 mbedtls_ssl_conf_dtls_cookies(&m_env->conf, mbedtls_ssl_cookie_write,
1191 mbedtls_ssl_cookie_check,
1192 &m_env->cookie_ctx);
1193#if MBEDTLS_VERSION_NUMBER >= 0x02100100
1194 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
1197#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
1205 mbedtls_ssl_conf_cid(&m_env->conf, COAP_DTLS_CID_LENGTH, MBEDTLS_SSL_UNEXPECTED_CID_IGNORE);
1212#if COAP_CLIENT_SUPPORT
1213static int *psk_ciphers = NULL;
1214static int *pki_ciphers = NULL;
1215static int *ecjpake_ciphers = NULL;
1216static int processed_ciphers = 0;
1218#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1220coap_ssl_ciphersuite_uses_psk(
const mbedtls_ssl_ciphersuite_t *info) {
1221#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1222 switch (info->key_exchange) {
1223 case MBEDTLS_KEY_EXCHANGE_PSK:
1224 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
1225 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
1226 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
1228 case MBEDTLS_KEY_EXCHANGE_NONE:
1229 case MBEDTLS_KEY_EXCHANGE_RSA:
1230 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
1231 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
1232 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
1233 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
1234 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
1235 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
1240 return mbedtls_ssl_ciphersuite_uses_psk(info);
1246set_ciphersuites(mbedtls_ssl_config *conf, coap_enc_method_t method) {
1247 if (!processed_ciphers) {
1248 const int *list = mbedtls_ssl_list_ciphersuites();
1249 const int *base = list;
1252#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1254 int ecjpake_count = 1;
1260 const mbedtls_ssl_ciphersuite_t *cur =
1261 mbedtls_ssl_ciphersuite_from_id(*list);
1264#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1265 if (cur->max_tls_version < MBEDTLS_SSL_VERSION_TLS1_2) {
1269 if (cur->max_minor_ver < MBEDTLS_SSL_MINOR_VERSION_3) {
1273#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1274 else if (cur->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
1278#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1279 else if (cur->min_tls_version >= MBEDTLS_SSL_VERSION_TLS1_3) {
1284#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1285 else if (coap_ssl_ciphersuite_uses_psk(cur)) {
1297 psk_ciphers = mbedtls_malloc(psk_count *
sizeof(psk_ciphers[0]));
1298 if (psk_ciphers == NULL) {
1299 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", psk_count);
1302 pki_ciphers = mbedtls_malloc(pki_count *
sizeof(pki_ciphers[0]));
1303 if (pki_ciphers == NULL) {
1304 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", pki_count);
1305 mbedtls_free(psk_ciphers);
1309#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1310 ecjpake_ciphers = mbedtls_malloc(ecjpake_count *
sizeof(ecjpake_ciphers[0]));
1311 if (ecjpake_ciphers == NULL) {
1312 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", pki_count);
1313 mbedtls_free(psk_ciphers);
1314 mbedtls_free(pki_ciphers);
1321 psk_list = psk_ciphers;
1322 pki_list = pki_ciphers;
1323#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1324 ecjpake_list = ecjpake_ciphers;
1328 const mbedtls_ssl_ciphersuite_t *cur =
1329 mbedtls_ssl_ciphersuite_from_id(*list);
1331#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1332 if (cur->max_tls_version < MBEDTLS_SSL_VERSION_TLS1_2) {
1336 if (cur->max_minor_ver < MBEDTLS_SSL_MINOR_VERSION_3) {
1340#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1341 else if (cur->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
1342 *ecjpake_list = *list;
1346#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1347 else if (cur->min_tls_version >= MBEDTLS_SSL_VERSION_TLS1_3) {
1354#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1355 else if (coap_ssl_ciphersuite_uses_psk(cur)) {
1370 processed_ciphers = 1;
1374 mbedtls_ssl_conf_ciphersuites(conf, psk_ciphers);
1377 mbedtls_ssl_conf_ciphersuites(conf, pki_ciphers);
1379 case COAP_ENC_ECJPAKE:
1380 mbedtls_ssl_conf_ciphersuites(conf, ecjpake_ciphers);
1390 coap_mbedtls_env_t *m_env) {
1393 coap_mbedtls_context_t *m_context =
1396 m_context->psk_pki_enabled |= IS_CLIENT;
1398 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1399 MBEDTLS_SSL_IS_CLIENT,
1401 MBEDTLS_SSL_TRANSPORT_DATAGRAM :
1402 MBEDTLS_SSL_TRANSPORT_STREAM,
1403 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
1404 coap_log_err(
"mbedtls_ssl_config_defaults returned -0x%x: '%s'\n",
1405 -ret, get_error_string(ret));
1409#if defined(MBEDTLS_SSL_PROTO_DTLS)
1410 mbedtls_ssl_conf_handshake_timeout(&m_env->conf, COAP_DTLS_RETRANSMIT_MS,
1411 COAP_DTLS_RETRANSMIT_TOTAL_MS);
1414 mbedtls_ssl_conf_authmode(&m_env->conf, MBEDTLS_SSL_VERIFY_REQUIRED);
1415 mbedtls_ssl_conf_rng(&m_env->conf, mbedtls_ctr_drbg_random, &m_env->ctr_drbg);
1417 if (m_context->psk_pki_enabled & IS_PSK) {
1418#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1426 if (psk_key == NULL || psk_identity == NULL) {
1427 ret = MBEDTLS_ERR_SSL_ALLOC_FAILED;
1431 if ((ret = mbedtls_ssl_conf_psk(&m_env->conf, psk_key->
s,
1432 psk_key->
length, psk_identity->
s,
1433 psk_identity->
length)) != 0) {
1434 coap_log_err(
"mbedtls_ssl_conf_psk returned -0x%x: '%s'\n",
1435 -ret, get_error_string(ret));
1439 if ((ret = mbedtls_ssl_set_hostname(&m_env->ssl,
1441 coap_log_err(
"mbedtls_ssl_set_hostname returned -0x%x: '%s'\n",
1442 -ret, get_error_string(ret));
1448#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1450 m_env->ec_jpake = 1;
1451 set_ciphersuites(&m_env->conf, COAP_ENC_ECJPAKE);
1452#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1453 mbedtls_ssl_conf_max_tls_version(&m_env->conf, MBEDTLS_SSL_VERSION_TLS1_2);
1456 set_ciphersuites(&m_env->conf, COAP_ENC_PSK);
1459 set_ciphersuites(&m_env->conf, COAP_ENC_PSK);
1464 }
else if ((m_context->psk_pki_enabled & IS_PKI) ||
1465 (m_context->psk_pki_enabled & (IS_PSK | IS_PKI)) == 0) {
1472 if (!(m_context->psk_pki_enabled & IS_PKI)) {
1486 mbedtls_ssl_conf_authmode(&m_env->conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
1487 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1488 &m_env->private_key, m_env, m_context,
1489 c_session, setup_data,
1495#if defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_SSL_ALPN)
1498 static const char *alpn_list[] = {
"coap", NULL };
1500 ret = mbedtls_ssl_conf_alpn_protocols(&m_env->conf, alpn_list);
1506 mbedtls_ssl_set_hostname(&m_env->ssl, m_context->setup_data.client_sni);
1507#if defined(MBEDTLS_SSL_PROTO_DTLS)
1508#if MBEDTLS_VERSION_NUMBER >= 0x02100100
1509 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
1512 set_ciphersuites(&m_env->conf, COAP_ENC_PKI);
1522mbedtls_cleanup(coap_mbedtls_env_t *m_env) {
1527 mbedtls_x509_crt_free(&m_env->cacert);
1528 mbedtls_x509_crt_free(&m_env->public_cert);
1529 mbedtls_pk_free(&m_env->private_key);
1530 mbedtls_entropy_free(&m_env->entropy);
1531 mbedtls_ssl_config_free(&m_env->conf);
1532 mbedtls_ctr_drbg_free(&m_env->ctr_drbg);
1533 mbedtls_ssl_free(&m_env->ssl);
1534 mbedtls_ssl_cookie_free(&m_env->cookie_ctx);
1538coap_dtls_free_mbedtls_env(coap_mbedtls_env_t *m_env) {
1540 if (!m_env->sent_alert)
1541 mbedtls_ssl_close_notify(&m_env->ssl);
1542 mbedtls_cleanup(m_env);
1543 mbedtls_free(m_env);
1547#if COAP_MAX_LOGGING_LEVEL > 0
1549report_mbedtls_alert(
unsigned char alert) {
1551 case MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC:
1552 return ": Bad Record MAC";
1553 case MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE:
1554 return ": Handshake failure";
1555 case MBEDTLS_SSL_ALERT_MSG_NO_CERT:
1556 return ": No Certificate provided";
1557 case MBEDTLS_SSL_ALERT_MSG_BAD_CERT:
1558 return ": Certificate is bad";
1559 case MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN:
1560 return ": Certificate is unknown";
1561 case MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA:
1562 return ": CA is unknown";
1563 case MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED:
1564 return ": Access was denied";
1565 case MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR:
1566 return ": Decrypt error";
1580 coap_mbedtls_env_t *m_env) {
1584 ret = mbedtls_ssl_handshake(&m_env->ssl);
1587 m_env->established = 1;
1591#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
1592#if COAP_CLIENT_SUPPORT
1595 coap_mbedtls_context_t *m_context;
1599 m_context->setup_data.use_cid) {
1600 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX];
1602 size_t peer_cid_len;
1605 if (mbedtls_ssl_get_peer_cid(&m_env->ssl, &enabled, peer_cid, &peer_cid_len) == 0 &&
1606 enabled == MBEDTLS_SSL_CID_ENABLED) {
1617 case MBEDTLS_ERR_SSL_WANT_READ:
1618 case MBEDTLS_ERR_SSL_WANT_WRITE:
1619 if (m_env->ssl.state == MBEDTLS_SSL_SERVER_HELLO
1620#
if MBEDTLS_VERSION_NUMBER >= 0x03030000
1621 || m_env->ssl.state == MBEDTLS_SSL_NEW_SESSION_TICKET
1624 if (++m_env->server_hello_cnt > 10) {
1632 case MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED:
1635 case MBEDTLS_ERR_SSL_INVALID_MAC:
1637#ifdef MBEDTLS_2_X_COMPAT
1638 case MBEDTLS_ERR_SSL_UNKNOWN_CIPHER:
1640 case MBEDTLS_ERR_SSL_DECODE_ERROR:
1643 case MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE:
1644 alert = MBEDTLS_SSL_ALERT_MSG_NO_CERT;
1646#ifdef MBEDTLS_2_X_COMPAT
1647 case MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO:
1648 case MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO:
1649 alert = MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE;
1652 case MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:
1654 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
1655 if (m_env->ssl.in_msg[1] != MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY)
1658 report_mbedtls_alert(m_env->ssl.in_msg[1]));
1660 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
1661 case MBEDTLS_ERR_SSL_CONN_EOF:
1662 case MBEDTLS_ERR_NET_CONN_RESET:
1668 "returned -0x%x: '%s'\n",
1669 -ret, get_error_string(ret));
1676 mbedtls_ssl_send_alert_message(&m_env->ssl,
1677 MBEDTLS_SSL_ALERT_LEVEL_FATAL,
1679 m_env->sent_alert = 1;
1684 get_error_string(ret));
1686 mbedtls_ssl_session_reset(&m_env->ssl);
1687#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1688 if (m_env->ec_jpake) {
1691#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
1697#elif COAP_CLIENT_SUPPORT
1703 mbedtls_ssl_set_hs_ecjpake_password(&m_env->ssl, psk_key->
s, psk_key->
length);
1711mbedtls_debug_out(
void *ctx
COAP_UNUSED,
int level,
1744#if !COAP_DISABLE_TCP
1752coap_sock_read(
void *ctx,
unsigned char *out,
size_t outl) {
1753 int ret = MBEDTLS_ERR_SSL_CONN_EOF;
1760 if (errno == ECONNRESET) {
1762 ret = MBEDTLS_ERR_SSL_CONN_EOF;
1764 ret = MBEDTLS_ERR_NET_RECV_FAILED;
1766 }
else if (ret == 0) {
1768 ret = MBEDTLS_ERR_SSL_WANT_READ;
1781coap_sock_write(
void *context,
const unsigned char *in,
size_t inl) {
1786 (
const uint8_t *)in,
1792 (errno == EPIPE || errno == ECONNRESET)) {
1807 int lasterror = WSAGetLastError();
1809 if (lasterror == WSAEWOULDBLOCK) {
1810 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
1811 }
else if (lasterror == WSAECONNRESET) {
1812 ret = MBEDTLS_ERR_NET_CONN_RESET;
1815 if (errno == EAGAIN || errno == EINTR) {
1816 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
1817 }
else if (errno == EPIPE || errno == ECONNRESET) {
1818 ret = MBEDTLS_ERR_NET_CONN_RESET;
1822 ret = MBEDTLS_ERR_NET_SEND_FAILED;
1831 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
1837static coap_mbedtls_env_t *
1842 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
1847 m_env = (coap_mbedtls_env_t *)mbedtls_malloc(
sizeof(coap_mbedtls_env_t));
1851 memset(m_env, 0,
sizeof(coap_mbedtls_env_t));
1853 mbedtls_ssl_init(&m_env->ssl);
1854 mbedtls_ctr_drbg_init(&m_env->ctr_drbg);
1855 mbedtls_ssl_config_init(&m_env->conf);
1856 mbedtls_entropy_init(&m_env->entropy);
1858#if defined(MBEDTLS_PSA_CRYPTO_C)
1862#if defined(ESPIDF_VERSION) && defined(CONFIG_MBEDTLS_DEBUG)
1863 mbedtls_esp_enable_debug_log(&m_env->conf, CONFIG_MBEDTLS_DEBUG_LEVEL);
1865 if ((ret = mbedtls_ctr_drbg_seed(&m_env->ctr_drbg,
1866 mbedtls_entropy_func, &m_env->entropy, NULL, 0)) != 0) {
1867 if (ret != MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED) {
1868 coap_log_info(
"mbedtls_ctr_drbg_seed returned -0x%x: '%s'\n",
1869 -ret, get_error_string(ret));
1872 coap_log_err(
"mbedtls_ctr_drbg_seed returned -0x%x: '%s'\n",
1873 -ret, get_error_string(ret));
1877#if COAP_CLIENT_SUPPORT
1878 if (setup_client_ssl_session(c_session, m_env) != 0) {
1885#if defined(MBEDTLS_SSL_SRV_C)
1886 if (setup_server_ssl_session(c_session, m_env) != 0) {
1896#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1897 mbedtls_ssl_conf_min_tls_version(&m_env->conf, MBEDTLS_SSL_VERSION_TLS1_2);
1899 mbedtls_ssl_conf_min_version(&m_env->conf, MBEDTLS_SSL_MAJOR_VERSION_3,
1900 MBEDTLS_SSL_MINOR_VERSION_3);
1903 if (mbedtls_ssl_setup(&m_env->ssl, &m_env->conf) != 0) {
1907 mbedtls_ssl_set_bio(&m_env->ssl, c_session, coap_dgram_write,
1908 coap_dgram_read, NULL);
1909#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
1912#if COAP_CLIENT_SUPPORT
1913 coap_mbedtls_context_t *m_context =
1917 m_context->setup_data.use_cid) {
1925 mbedtls_ssl_set_cid(&m_env->ssl, MBEDTLS_SSL_CID_ENABLED, NULL, 0);
1929#if COAP_SERVER_SUPPORT
1930 uint8_t cid[COAP_DTLS_CID_LENGTH];
1939 mbedtls_ssl_set_cid(&m_env->ssl, MBEDTLS_SSL_CID_ENABLED, cid,
1947#if !COAP_DISABLE_TCP
1950 mbedtls_ssl_set_bio(&m_env->ssl, c_session, coap_sock_write,
1951 coap_sock_read, NULL);
1954#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1955 coap_mbedtls_context_t *m_context =
1957 if ((m_context->psk_pki_enabled & IS_PSK) &&
1961#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
1967#elif COAP_CLIENT_SUPPORT
1972 mbedtls_ssl_set_hs_ecjpake_password(&m_env->ssl, psk_key->
s, psk_key->
length);
1976 mbedtls_ssl_set_timer_cb(&m_env->ssl, &m_env->timer,
1977 zephyr_timing_set_delay,
1978 zephyr_timing_get_delay);
1980 mbedtls_ssl_set_timer_cb(&m_env->ssl, &m_env->timer,
1981 mbedtls_timing_set_delay,
1982 mbedtls_timing_get_delay);
1985 mbedtls_ssl_conf_dbg(&m_env->conf, mbedtls_debug_out, stdout);
1990 mbedtls_free(m_env);
1997#if defined(MBEDTLS_SSL_PROTO_DTLS)
2000 static int reported = 0;
2004 " - update Mbed TLS to include DTLS\n");
2012#if !COAP_DISABLE_TCP
2061#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2068#if COAP_CLIENT_SUPPORT
2071#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2084 coap_mbedtls_context_t *m_context;
2087 m_context = (coap_mbedtls_context_t *)mbedtls_malloc(
sizeof(coap_mbedtls_context_t));
2089 memset(m_context, 0,
sizeof(coap_mbedtls_context_t));
2094#if COAP_SERVER_SUPPORT
2103 coap_mbedtls_context_t *m_context =
2106#if !defined(MBEDTLS_SSL_SRV_C)
2108 " libcoap not compiled for Server Mode for Mbed TLS"
2109 " - update Mbed TLS to include Server Mode\n");
2112 if (!m_context || !setup_data)
2116#ifndef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2117 coap_log_warn(
"Mbed TLS not compiled for EC-JPAKE support\n");
2120 m_context->psk_pki_enabled |= IS_PSK;
2125#if COAP_CLIENT_SUPPORT
2134#if !defined(MBEDTLS_SSL_CLI_C)
2139 " libcoap not compiled for Client Mode for Mbed TLS"
2140 " - update Mbed TLS to include Client Mode\n");
2143 coap_mbedtls_context_t *m_context =
2146 if (!m_context || !setup_data)
2150 coap_log_warn(
"CoAP Client with Mbed TLS does not support Identity Hint selection\n");
2153#ifndef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2154 coap_log_warn(
"Mbed TLS not compiled for EC-JPAKE support\n");
2158#ifndef MBEDTLS_SSL_DTLS_CONNECTION_ID
2159 coap_log_warn(
"Mbed TLS not compiled for Connection-ID support\n");
2162 m_context->psk_pki_enabled |= IS_PSK;
2172 coap_mbedtls_context_t *m_context =
2175 m_context->setup_data = *setup_data;
2176 if (!m_context->setup_data.verify_peer_cert) {
2178 m_context->setup_data.check_common_ca = 0;
2180 m_context->setup_data.allow_self_signed = 1;
2181 m_context->setup_data.allow_expired_certs = 1;
2182 m_context->setup_data.cert_chain_validation = 1;
2183 m_context->setup_data.cert_chain_verify_depth = 10;
2184 m_context->setup_data.check_cert_revocation = 1;
2185 m_context->setup_data.allow_no_crl = 1;
2186 m_context->setup_data.allow_expired_crl = 1;
2187 m_context->setup_data.allow_bad_md_hash = 1;
2188 m_context->setup_data.allow_short_rsa_length = 1;
2190 m_context->psk_pki_enabled |= IS_PKI;
2192#ifndef MBEDTLS_SSL_DTLS_CONNECTION_ID
2193 coap_log_warn(
"Mbed TLS not compiled for Connection-ID support\n");
2201 const char *ca_file,
2202 const char *ca_path) {
2203 coap_mbedtls_context_t *m_context =
2207 coap_log_warn(
"coap_context_set_pki_root_cas: (D)TLS environment "
2212 if (ca_file == NULL && ca_path == NULL) {
2213 coap_log_warn(
"coap_context_set_pki_root_cas: ca_file and/or ca_path "
2217 if (m_context->root_ca_file) {
2218 mbedtls_free(m_context->root_ca_file);
2219 m_context->root_ca_file = NULL;
2223 m_context->root_ca_file = mbedtls_strdup(ca_file);
2226 if (m_context->root_ca_path) {
2227 mbedtls_free(m_context->root_ca_path);
2228 m_context->root_ca_path = NULL;
2232 m_context->root_ca_path = mbedtls_strdup(ca_path);
2243 coap_mbedtls_context_t *m_context =
2247 coap_log_warn(
"coap_context_load_pki_trust_store: (D)TLS environment "
2251 m_context->trust_store_defined = 1;
2260 coap_mbedtls_context_t *m_context =
2262 return m_context->psk_pki_enabled ? 1 : 0;
2267 coap_mbedtls_context_t *m_context = (coap_mbedtls_context_t *)dtls_context;
2270 for (i = 0; i < m_context->pki_sni_count; i++) {
2271 mbedtls_free(m_context->pki_sni_entry_list[i].sni);
2273 mbedtls_x509_crt_free(&m_context->pki_sni_entry_list[i].public_cert);
2275 mbedtls_pk_free(&m_context->pki_sni_entry_list[i].private_key);
2277 mbedtls_x509_crt_free(&m_context->pki_sni_entry_list[i].cacert);
2279 if (m_context->pki_sni_entry_list)
2280 mbedtls_free(m_context->pki_sni_entry_list);
2282 for (i = 0; i < m_context->psk_sni_count; i++) {
2283 mbedtls_free(m_context->psk_sni_entry_list[i].sni);
2285 if (m_context->psk_sni_entry_list)
2286 mbedtls_free(m_context->psk_sni_entry_list);
2288 if (m_context->root_ca_path)
2289 mbedtls_free(m_context->root_ca_path);
2290 if (m_context->root_ca_file)
2291 mbedtls_free(m_context->root_ca_file);
2293 mbedtls_free(m_context);
2296#if COAP_CLIENT_SUPPORT
2299#if !defined(MBEDTLS_SSL_CLI_C)
2302 " libcoap not compiled for Client Mode for Mbed TLS"
2303 " - update Mbed TLS to include Client Mode\n");
2306 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
2315 m_env->last_timeout = now;
2316 ret = do_mbedtls_handshake(c_session, m_env);
2318 coap_dtls_free_mbedtls_env(m_env);
2327#if COAP_SERVER_SUPPORT
2330#if !defined(MBEDTLS_SSL_SRV_C)
2333 " libcoap not compiled for Server Mode for Mbed TLS"
2334 " - update Mbed TLS to include Server Mode\n");
2337 coap_mbedtls_env_t *m_env =
2338 (coap_mbedtls_env_t *)c_session->
tls;
2340#if defined(MBEDTLS_SSL_PROTO_DTLS)
2341#if MBEDTLS_VERSION_NUMBER >= 0x02100100
2342 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
2353 if (c_session && c_session->
context && c_session->
tls) {
2354 coap_dtls_free_mbedtls_env(c_session->
tls);
2355 c_session->
tls = NULL;
2363#if defined(MBEDTLS_SSL_PROTO_DTLS)
2364 coap_mbedtls_env_t *m_env =
2365 (coap_mbedtls_env_t *)c_session->
tls;
2367#if MBEDTLS_VERSION_NUMBER >= 0x02100100
2368 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
2378 const uint8_t *data,
size_t data_len) {
2380 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2382 assert(m_env != NULL);
2390 if (m_env->established) {
2391 ret = mbedtls_ssl_write(&m_env->ssl, (
const unsigned char *) data, data_len);
2394 case MBEDTLS_ERR_SSL_WANT_READ:
2395 case MBEDTLS_ERR_SSL_WANT_WRITE:
2398 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2404 "returned -0x%x: '%s'\n",
2405 -ret, get_error_string(ret));
2414 ret = do_mbedtls_handshake(c_session, m_env);
2447 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2449 int ret = zephyr_timing_get_delay(&m_env->timer);
2451 int ret = mbedtls_timing_get_delay(&m_env->timer);
2453 unsigned int scalar = 1 << m_env->retry_scalar;
2463 m_env->last_timeout = now;
2476 m_env->last_timeout = now;
2494 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2497 m_env->retry_scalar++;
2499 (do_mbedtls_handshake(c_session, m_env) < 0)) {
2514 const uint8_t *data,
2519 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2520 coap_ssl_t *ssl_data;
2522 assert(m_env != NULL);
2524 ssl_data = &m_env->coap_ssl_data;
2525 if (ssl_data->pdu_len) {
2526 coap_log_err(
"** %s: Previous data not read %u bytes\n",
2529 ssl_data->pdu = data;
2530 ssl_data->pdu_len = (unsigned)data_len;
2532 if (m_env->established) {
2533#if COAP_CONSTRAINED_STACK
2546 ret = mbedtls_ssl_read(&m_env->ssl, pdu,
sizeof(pdu));
2555 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
2556 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2559 case MBEDTLS_ERR_SSL_WANT_READ:
2563 "returned -0x%x: '%s' (length %zd)\n",
2564 -ret, get_error_string(ret), data_len);
2569 ret = do_mbedtls_handshake(c_session, m_env);
2574 if (ssl_data->pdu_len) {
2576 ret = do_mbedtls_handshake(c_session, m_env);
2597 if (ssl_data && ssl_data->pdu_len) {
2599 coap_log_debug(
"coap_dtls_receive: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
2600 ssl_data->pdu_len = 0;
2601 ssl_data->pdu = NULL;
2606#if COAP_SERVER_SUPPORT
2614 const uint8_t *data,
2616#if !defined(MBEDTLS_SSL_PROTO_DTLS) || !defined(MBEDTLS_SSL_SRV_C)
2621 " libcoap not compiled for DTLS or Server Mode for Mbed TLS"
2622 " - update Mbed TLS to include DTLS and Server Mode\n");
2625 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2626 coap_ssl_t *ssl_data;
2633 c_session->
tls = m_env;
2640 if ((ret = mbedtls_ssl_set_client_transport_id(&m_env->ssl,
2643 coap_log_err(
"mbedtls_ssl_set_client_transport_id() returned -0x%x: '%s'\n",
2644 -ret, get_error_string(ret));
2648 ssl_data = &m_env->coap_ssl_data;
2649 if (ssl_data->pdu_len) {
2650 coap_log_err(
"** %s: Previous data not read %u bytes\n",
2653 ssl_data->pdu = data;
2654 ssl_data->pdu_len = (unsigned)data_len;
2656 ret = do_mbedtls_handshake(c_session, m_env);
2657 if (ret == 0 || m_env->seen_client_hello) {
2663 m_env->seen_client_hello = 0;
2669 if (ssl_data->pdu_len) {
2671 coap_log_debug(
"coap_dtls_hello: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
2672 ssl_data->pdu_len = 0;
2673 ssl_data->pdu = NULL;
2682 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2683 int expansion = mbedtls_ssl_get_record_expansion(&m_env->ssl);
2685 if (expansion == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE) {
2691#if !COAP_DISABLE_TCP
2692#if COAP_CLIENT_SUPPORT
2695#if !defined(MBEDTLS_SSL_CLI_C)
2699 " libcoap not compiled for Client Mode for Mbed TLS"
2700 " - update Mbed TLS to include Client Mode\n");
2703 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
2713 m_env->last_timeout = now;
2714 c_session->
tls = m_env;
2715 ret = do_mbedtls_handshake(c_session, m_env);
2725#if COAP_SERVER_SUPPORT
2728#if !defined(MBEDTLS_SSL_SRV_C)
2733 " libcoap not compiled for Server Mode for Mbed TLS"
2734 " - update Mbed TLS to include Server Mode\n");
2737 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
2745 c_session->
tls = m_env;
2746 ret = do_mbedtls_handshake(c_session, m_env);
2771 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2772 size_t amount_sent = 0;
2774 assert(m_env != NULL);
2781 if (m_env->established) {
2782 while (amount_sent < data_len) {
2783 ret = mbedtls_ssl_write(&m_env->ssl, &data[amount_sent],
2784 data_len - amount_sent);
2787 case MBEDTLS_ERR_SSL_WANT_READ:
2788 case MBEDTLS_ERR_SSL_WANT_WRITE:
2795 case MBEDTLS_ERR_NET_CONN_RESET:
2796 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2801 "returned -0x%x: '%s'\n",
2802 -ret, get_error_string(ret));
2814 ret = do_mbedtls_handshake(c_session, m_env);
2835 if (ret == (ssize_t)data_len)
2854 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2863 if (!m_env->established && !m_env->sent_alert) {
2864 ret = do_mbedtls_handshake(c_session, m_env);
2873 ret = mbedtls_ssl_read(&m_env->ssl, data, data_len);
2877 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
2881 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2883 m_env->sent_alert = 1;
2886#if MBEDTLS_VERSION_NUMBER >= 0x03060000
2887 case MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET:
2889 case MBEDTLS_ERR_SSL_WANT_READ:
2895 "returned -0x%x: '%s' (length %zd)\n",
2896 -ret, get_error_string(ret), data_len);
2900 }
else if (ret < (
int)data_len) {
2901 c_session->
sock.
flags &= ~COAP_SOCKET_CAN_READ;
2929#if COAP_CLIENT_SUPPORT
2930 mbedtls_free(psk_ciphers);
2931 mbedtls_free(pki_ciphers);
2932 mbedtls_free(ecjpake_ciphers);
2935 ecjpake_ciphers = NULL;
2936 processed_ciphers = 0;
2946 if (c_session && c_session->
tls) {
2947 coap_mbedtls_env_t *m_env;
2950 memcpy(&m_env, &c_session->
tls,
sizeof(m_env));
2952 return (
void *)&m_env->ssl;
2961#if !defined(ESPIDF_VERSION)
2971 switch ((
int)level) {
2992 mbedtls_debug_set_threshold(use_level);
2994 keep_log_level = level;
2999 return keep_log_level;
3005 version.
version = mbedtls_version_get_number();
3011#if COAP_SERVER_SUPPORT
3014 mbedtls_sha256_context *digest_ctx = mbedtls_malloc(
sizeof(mbedtls_sha256_context));
3017 mbedtls_sha256_init(digest_ctx);
3018#ifdef MBEDTLS_2_X_COMPAT
3019 if (mbedtls_sha256_starts_ret(digest_ctx, 0) != 0) {
3021 if (mbedtls_sha256_starts(digest_ctx, 0) != 0) {
3033 mbedtls_sha256_free(digest_ctx);
3034 mbedtls_free(digest_ctx);
3040 const uint8_t *data,
3042#ifdef MBEDTLS_2_X_COMPAT
3043 int ret = mbedtls_sha256_update_ret(digest_ctx, data, data_len);
3045 int ret = mbedtls_sha256_update(digest_ctx, data, data_len);
3054#ifdef MBEDTLS_2_X_COMPAT
3055 int ret = mbedtls_sha256_finish_ret(digest_ctx, (uint8_t *)digest_buffer);
3057 int ret = mbedtls_sha256_finish(digest_ctx, (uint8_t *)digest_buffer);
3065#include <mbedtls/cipher.h>
3066#include <mbedtls/md.h>
3068#ifndef MBEDTLS_CIPHER_MODE_AEAD
3069#error need MBEDTLS_CIPHER_MODE_AEAD, please enable MBEDTLS_CCM_C
3072#ifdef MBEDTLS_ERROR_C
3073#include <mbedtls/error.h>
3076#ifdef MBEDTLS_ERROR_C
3079 int c_tmp = (int)(Func); \
3081 char error_buf[64]; \
3082 mbedtls_strerror(c_tmp, error_buf, sizeof(error_buf)); \
3083 coap_log_err("mbedtls: -0x%04x: %s\n", -c_tmp, error_buf); \
3090 int c_tmp = (int)(Func); \
3092 coap_log_err("mbedtls: %d\n", tmp); \
3103static struct hash_algs {
3105 mbedtls_md_type_t hash_type;
3113static mbedtls_md_type_t
3114get_hash_alg(
cose_alg_t alg,
size_t *hash_len) {
3117 for (idx = 0; idx <
sizeof(hashs) /
sizeof(
struct hash_algs); idx++) {
3118 if (hashs[idx].alg == alg) {
3119 *hash_len = hashs[idx].hash_size;
3120 return hashs[idx].hash_type;
3123 coap_log_debug(
"get_hash_alg: COSE hash %d not supported\n", alg);
3124 return MBEDTLS_MD_NONE;
3131 mbedtls_md_context_t ctx;
3133 const mbedtls_md_info_t *md_info;
3137 mbedtls_md_type_t dig_type = get_hash_alg(alg, &hash_length);
3139 if (dig_type == MBEDTLS_MD_NONE) {
3140 coap_log_debug(
"coap_crypto_hash: algorithm %d not supported\n", alg);
3143 md_info = mbedtls_md_info_from_type(dig_type);
3145 len = mbedtls_md_get_size(md_info);
3150 mbedtls_md_init(&ctx);
3151 C(mbedtls_md_setup(&ctx, md_info, 0));
3153 C(mbedtls_md_starts(&ctx));
3154 C(mbedtls_md_update(&ctx, (
const unsigned char *)data->
s, data->
length));
3158 C(mbedtls_md_finish(&ctx,
dummy->s));
3163 mbedtls_md_free(&ctx);
3168#if COAP_OSCORE_SUPPORT
3179static struct cipher_algs {
3181 mbedtls_cipher_type_t cipher_type;
3186static mbedtls_cipher_type_t
3190 for (idx = 0; idx <
sizeof(ciphers) /
sizeof(
struct cipher_algs); idx++) {
3191 if (ciphers[idx].alg == alg)
3192 return ciphers[idx].cipher_type;
3194 coap_log_debug(
"get_cipher_alg: COSE cipher %d not supported\n", alg);
3203static struct hmac_algs {
3205 mbedtls_md_type_t hmac_type;
3212static mbedtls_md_type_t
3216 for (idx = 0; idx <
sizeof(hmacs) /
sizeof(
struct hmac_algs); idx++) {
3217 if (hmacs[idx].hmac_alg == hmac_alg)
3218 return hmacs[idx].hmac_type;
3220 coap_log_debug(
"get_hmac_alg: COSE HMAC %d not supported\n", hmac_alg);
3226 return get_cipher_alg(alg) != 0;
3235 return get_hmac_alg(hmac_alg) != 0;
3243setup_cipher_context(mbedtls_cipher_context_t *ctx,
3245 const uint8_t *key_data,
3247 mbedtls_operation_t mode) {
3248 const mbedtls_cipher_info_t *cipher_info;
3249 mbedtls_cipher_type_t cipher_type;
3253 memset(key, 0,
sizeof(key));
3255 if ((cipher_type = get_cipher_alg(coap_alg)) == 0) {
3256 coap_log_debug(
"coap_crypto_encrypt: algorithm %d not supported\n",
3260 cipher_info = mbedtls_cipher_info_from_type(cipher_type);
3262 coap_log_crit(
"coap_crypto_encrypt: cannot get cipher info\n");
3266 mbedtls_cipher_init(ctx);
3268 C(mbedtls_cipher_setup(ctx, cipher_info));
3269 klen = mbedtls_cipher_get_key_bitlen(ctx);
3270 if ((klen > (
int)(
sizeof(key) * 8)) || (key_length >
sizeof(key))) {
3274 memcpy(key, key_data, key_length);
3275 C(mbedtls_cipher_setkey(ctx, key, klen, mode));
3280 mbedtls_cipher_free(ctx);
3289 size_t *max_result_len) {
3290 mbedtls_cipher_context_t ctx;
3292#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
3293 unsigned char tag[16];
3296 size_t result_len = *max_result_len;
3302 assert(params != NULL);
3309 if (!setup_cipher_context(&ctx,
3324#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
3325 C(mbedtls_cipher_auth_encrypt(&ctx,
3338 if ((result_len + ccm->
tag_len) > *max_result_len) {
3343 memcpy(result + result_len, tag, ccm->
tag_len);
3344 *max_result_len = result_len + ccm->
tag_len;
3347 C(mbedtls_cipher_auth_encrypt_ext(&ctx,
3359 *max_result_len = result_len;
3364 mbedtls_cipher_free(&ctx);
3373 size_t *max_result_len) {
3374 mbedtls_cipher_context_t ctx;
3376#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
3377 const unsigned char *tag;
3380 size_t result_len = *max_result_len;
3386 assert(params != NULL);
3394 if (!setup_cipher_context(&ctx,
3414#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
3416 C(mbedtls_cipher_auth_decrypt(&ctx,
3429 C(mbedtls_cipher_auth_decrypt_ext(&ctx,
3444 *max_result_len = result_len;
3447 mbedtls_cipher_free(&ctx);
3456 mbedtls_md_context_t ctx;
3458 const int use_hmac = 1;
3459 const mbedtls_md_info_t *md_info;
3460 mbedtls_md_type_t mac_algo;
3468 if ((mac_algo = get_hmac_alg(hmac_alg)) == 0) {
3469 coap_log_debug(
"coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
3472 md_info = mbedtls_md_info_from_type(mac_algo);
3474 len = mbedtls_md_get_size(md_info);
3479 mbedtls_md_init(&ctx);
3480 C(mbedtls_md_setup(&ctx, md_info, use_hmac));
3482 C(mbedtls_md_hmac_starts(&ctx, key->
s, key->
length));
3483 C(mbedtls_md_hmac_update(&ctx, (
const unsigned char *)data->
s, data->
length));
3487 C(mbedtls_md_hmac_finish(&ctx,
dummy->s));
3492 mbedtls_md_free(&ctx);
3504#pragma GCC diagnostic ignored "-Wunused-function"
#define COAP_SERVER_SUPPORT
const char * coap_socket_strerror(void)
#define COAP_RXBUFFER_SIZE
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
Library specific build wrapper for coap_internal.h.
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
void coap_dtls_free_context(void *handle COAP_UNUSED)
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
void coap_digest_free(coap_digest_ctx_t *digest_ctx)
Free off coap_digest_ctx_t.
int coap_digest_final(coap_digest_ctx_t *digest_ctx, coap_digest_t *digest_buffer)
Finalize the coap_digest information into the provided digest_buffer.
int coap_digest_update(coap_digest_ctx_t *digest_ctx, const uint8_t *data, size_t data_len)
Update the coap_digest information with the next chunk of data.
coap_digest_ctx_t * coap_digest_setup(void)
Initialize a coap_digest.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
void coap_ticks(coap_tick_t *t)
Returns the current value of an internal tick counter.
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
#define COAP_CRYPTO_MAX_KEY_SIZE
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
void * coap_tls_new_server_session(coap_session_t *coap_session)
Create a TLS new server-side session.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
void * coap_dtls_new_client_session(coap_session_t *coap_session)
Create a new client-side session.
void * coap_dtls_new_server_session(coap_session_t *coap_session)
Create a new DTLS server-side session.
int coap_dtls_hello(coap_session_t *coap_session, const uint8_t *data, size_t data_len)
Handling client HELLO messages from a new candiate peer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
int coap_dtls_context_set_spsk(coap_context_t *coap_context, coap_dtls_spsk_t *setup_data)
Set the DTLS context's default server PSK information.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
void * coap_tls_new_client_session(coap_session_t *coap_session)
Create a new TLS client-side session.
#define COAP_DTLS_RETRANSMIT_COAP_TICKS
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_KEY_ROOT_CA
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
@ COAP_TLS_LIBRARY_MBEDTLS
Using Mbed TLS library.
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
#define coap_lock_callback_ret(r, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
#define coap_log_emerg(...)
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
#define coap_dtls_log(level,...)
Logging function.
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
#define coap_log_warn(...)
#define coap_log_err(...)
#define coap_log_crit(...)
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
@ COSE_HMAC_ALG_HMAC384_384
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_HMAC_ALG_HMAC512_512
@ COSE_ALGORITHM_SHA_256_256
@ COSE_ALGORITHM_AES_CCM_16_64_128
@ COSE_ALGORITHM_AES_CCM_16_64_256
coap_proto_t
CoAP protocol types Note: coap_layers_coap[] needs updating if extended.
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
#define COAP_PROTO_NOT_RELIABLE(p)
@ COAP_SESSION_TYPE_CLIENT
client-side
@ COAP_SESSION_STATE_HANDSHAKE
@ COAP_SESSION_STATE_NONE
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
coap_address_t remote
remote address and port
CoAP binary data definition with const data.
size_t length
length of binary data
const uint8_t * s
read-only binary data
CoAP binary data definition.
The CoAP stack's global state is stored in a coap_context_t object.
uint8_t testing_cids
Change client's source port every testing_cids.
coap_dtls_spsk_t spsk_setup_data
Contains the initial PSK server setup data.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
cose_alg_t alg
The COSE algorith to use.
The structure used for defining the Client PSK setup data to be used.
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
char * client_sni
If not NULL, SNI to use in client TLS setup.
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
The structure that holds the PKI key information.
coap_pki_key_define_t define
for definable type keys
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
The structure used for defining the PKI setup data to be used.
uint8_t allow_no_crl
1 ignore if CRL not there
void * cn_call_back_arg
Passed in to the CN callback function.
uint8_t allow_short_rsa_length
1 if small RSA keysizes are allowed
uint8_t cert_chain_validation
1 if to check cert_chain_verify_depth
uint8_t allow_bad_md_hash
1 if unsupported MD hashes are allowed
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
uint8_t check_cert_revocation
1 if revocation checks wanted
uint8_t cert_chain_verify_depth
recommended depth is 3
uint8_t allow_expired_certs
1 if expired certs are allowed
uint8_t verify_peer_cert
Set to COAP_DTLS_PKI_SETUP_VERSION to support this version of the struct.
uint8_t allow_self_signed
1 if self-signed certs are allowed.
coap_dtls_cn_callback_t validate_cn_call_back
CN check callback function.
uint8_t allow_expired_crl
1 if expired crl is allowed
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
uint8_t check_common_ca
1 if peer cert is to be signed by the same CA as the local cert
The structure that holds the Server Pre-Shared Key and Identity Hint information.
The structure used for defining the Server PSK setup data to be used.
coap_dtls_psk_sni_callback_t validate_sni_call_back
SNI check callback function.
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
void * id_call_back_arg
Passed in to the Identity callback function.
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
void * sni_call_back_arg
Passed in to the SNI callback function.
coap_layer_write_t l_write
coap_layer_establish_t l_establish
coap_const_char_ptr_t public_cert
define: Public Cert
coap_const_char_ptr_t private_key
define: Private Key
coap_const_char_ptr_t ca
define: Common CA Certificate
size_t public_cert_len
define Public Cert length (if needed)
size_t ca_len
define CA Cert length (if needed)
coap_pki_define_t private_key_def
define: Private Key type definition
size_t private_key_len
define Private Key length (if needed)
coap_pki_define_t ca_def
define: Common CA type definition
coap_pki_define_t public_cert_def
define: Public Cert type definition
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
unsigned int dtls_timeout_count
dtls setup retry counter
coap_endpoint_t * endpoint
session's endpoint
coap_socket_t sock
socket object for the session, if any
coap_session_state_t state
current state of relationship with peer
coap_bin_const_t * client_cid
Contains client CID or NULL.
coap_addr_tuple_t addr_info
remote/local address info
coap_proto_t proto
protocol used
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
uint8_t negotiated_cid
Set for a client if CID negotiated.
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_session_type_t type
client or server side socket
coap_context_t * context
session's context
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
The structure used for returning the underlying (D)TLS library information.
uint64_t built_version
(D)TLS Built against Library Version
coap_tls_library_t type
Library type.
uint64_t version
(D)TLS runtime Library Version
const char * s_byte
signed char ptr
const uint8_t * u_byte
unsigned char ptr