37#if COAP_WITH_LIBMBEDTLS
53#include <mbedtls/version.h>
56#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
57#define MBEDTLS_2_X_COMPAT
60#ifndef MBEDTLS_ALLOW_PRIVATE_ACCESS
61#define MBEDTLS_ALLOW_PRIVATE_ACCESS
65#include <mbedtls/platform.h>
66#include <mbedtls/net_sockets.h>
67#include <mbedtls/ssl.h>
68#include <mbedtls/version.h>
71#if MBEDTLS_VERSION_NUMBER >= 0x04000000
72#define COAP_USE_PSA_CRYPTO 1
74#define COAP_USE_PSA_CRYPTO 0
77#if COAP_USE_PSA_CRYPTO
78#include <psa/crypto.h>
80#include <mbedtls/entropy.h>
81#include <mbedtls/ctr_drbg.h>
82#include <mbedtls/sha256.h>
83#include <mbedtls/md.h>
84#include <mbedtls/cipher.h>
86#include <mbedtls/error.h>
87#include <mbedtls/timing.h>
88#include <mbedtls/ssl_cookie.h>
89#include <mbedtls/oid.h>
90#include <mbedtls/debug.h>
91#if defined(ESPIDF_VERSION) && defined(CONFIG_MBEDTLS_DEBUG)
92#include <mbedtls/esp_debug.h>
94#if !COAP_USE_PSA_CRYPTO && defined(MBEDTLS_PSA_CRYPTO_C)
95#include <psa/crypto.h>
101#if COAP_USE_PSA_CRYPTO
102typedef psa_hash_operation_t coap_crypto_sha256_ctx_t;
103typedef psa_algorithm_t coap_crypto_md_type_t;
105#define COAP_CRYPTO_MD_SHA1 PSA_ALG_SHA_1
106#define COAP_CRYPTO_MD_SHA256 PSA_ALG_SHA_256
107#define COAP_CRYPTO_MD_SHA384 PSA_ALG_SHA_384
108#define COAP_CRYPTO_MD_SHA512 PSA_ALG_SHA_512
109#define COAP_CRYPTO_MD_NONE PSA_ALG_NONE
112typedef mbedtls_sha256_context coap_crypto_sha256_ctx_t;
113typedef mbedtls_md_type_t coap_crypto_md_type_t;
115#define COAP_CRYPTO_MD_SHA1 MBEDTLS_MD_SHA1
116#define COAP_CRYPTO_MD_SHA256 MBEDTLS_MD_SHA256
117#define COAP_CRYPTO_MD_SHA384 MBEDTLS_MD_SHA384
118#define COAP_CRYPTO_MD_SHA512 MBEDTLS_MD_SHA512
119#define COAP_CRYPTO_MD_NONE MBEDTLS_MD_NONE
126strndup(
const char *s1,
size_t n) {
127 char *copy = (
char *)malloc(n + 1);
136#define mbedtls_malloc(a) malloc(a)
137#define mbedtls_realloc(a,b) realloc(a,b)
138#define mbedtls_strdup(a) strdup(a)
139#define mbedtls_strndup(a,b) strndup(a,b)
141#define mbedtls_free(a) free(a)
143#ifndef MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED
145#ifdef MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
146#define MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED
150#if ! COAP_SERVER_SUPPORT
151#undef MBEDTLS_SSL_SRV_C
153#if ! COAP_CLIENT_SUPPORT
154#undef MBEDTLS_SSL_CLI_C
158#define strcasecmp _stricmp
161#define IS_PSK (1 << 0)
162#define IS_PKI (1 << 1)
163#define IS_CLIENT (1 << 6)
164#define IS_SERVER (1 << 7)
166typedef struct coap_ssl_t {
177typedef struct coap_mbedtls_env_t {
178 mbedtls_ssl_context ssl;
179#if !COAP_USE_PSA_CRYPTO
180 mbedtls_entropy_context entropy;
181 mbedtls_ctr_drbg_context ctr_drbg;
183 mbedtls_ssl_config conf;
184 mbedtls_timing_delay_context timer;
185 mbedtls_x509_crt cacert;
186 mbedtls_x509_crt public_cert;
187 mbedtls_pk_context private_key;
188 mbedtls_ssl_cookie_ctx cookie_ctx;
192 int seen_client_hello;
195 unsigned int retry_scalar;
196 coap_ssl_t coap_ssl_data;
197 uint32_t server_hello_cnt;
200typedef struct pki_sni_entry {
203 mbedtls_x509_crt cacert;
204 mbedtls_x509_crt public_cert;
205 mbedtls_pk_context private_key;
208typedef struct psk_sni_entry {
213typedef struct coap_mbedtls_context_t {
215 size_t pki_sni_count;
216 pki_sni_entry *pki_sni_entry_list;
217 size_t psk_sni_count;
218 psk_sni_entry *psk_sni_entry_list;
221 int trust_store_defined;
223} coap_mbedtls_context_t;
225typedef enum coap_enc_method_t {
237} zephyr_timing_delay_context;
240zephyr_timing_set_delay(
void *data, uint32_t int_ms, uint32_t fin_ms) {
241 zephyr_timing_delay_context *ctx = (zephyr_timing_delay_context *)data;
247 ctx->start_time = k_uptime_get_32();
250 ctx->int_time = ctx->start_time + int_ms;
251 ctx->fin_time = ctx->start_time + fin_ms;
259zephyr_timing_get_delay(
void *data) {
260 zephyr_timing_delay_context *ctx = (zephyr_timing_delay_context *)data;
263 if (ctx == NULL || ctx->fin_time == 0) {
267 now = k_uptime_get_32();
269 if (now >= ctx->fin_time) {
273 if (now >= ctx->int_time) {
287#if COAP_SERVER_SUPPORT
291coap_crypto_sha256_init(coap_crypto_sha256_ctx_t *ctx) {
292#if COAP_USE_PSA_CRYPTO
293 *ctx = psa_hash_operation_init();
294 return (psa_hash_setup(ctx, PSA_ALG_SHA_256) == PSA_SUCCESS) ? 0 : -1;
296 mbedtls_sha256_init(ctx);
297#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
298 return mbedtls_sha256_starts_ret(ctx, 0);
300 return mbedtls_sha256_starts(ctx, 0);
306coap_crypto_sha256_update(coap_crypto_sha256_ctx_t *ctx,
307 const uint8_t *data,
size_t len) {
308#if COAP_USE_PSA_CRYPTO
309 return (psa_hash_update(ctx, data, len) == PSA_SUCCESS) ? 0 : -1;
311#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
312 return mbedtls_sha256_update_ret(ctx, data, len);
314 return mbedtls_sha256_update(ctx, data, len);
320coap_crypto_sha256_finish(coap_crypto_sha256_ctx_t *ctx, uint8_t *output) {
321#if COAP_USE_PSA_CRYPTO
323 return (psa_hash_finish(ctx, output, 32, &hash_len) == PSA_SUCCESS) ? 0 : -1;
325#if (MBEDTLS_VERSION_NUMBER < 0x03000000)
326 return mbedtls_sha256_finish_ret(ctx, output);
328 return mbedtls_sha256_finish(ctx, output);
334coap_crypto_sha256_free(coap_crypto_sha256_ctx_t *ctx) {
335#if COAP_USE_PSA_CRYPTO
338 mbedtls_sha256_free(ctx);
346coap_crypto_hash_size(coap_crypto_md_type_t md_type) {
347#if COAP_USE_PSA_CRYPTO
348 switch ((
int)md_type) {
351 case PSA_ALG_SHA_256:
353 case PSA_ALG_SHA_384:
355 case PSA_ALG_SHA_512:
361 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_type);
362 return md_info ? mbedtls_md_get_size(md_info) : 0;
367coap_crypto_hash_compute(coap_crypto_md_type_t md_type,
368 const uint8_t *input,
size_t ilen,
369 uint8_t *output,
size_t output_size,
370 size_t *output_len) {
371#if COAP_USE_PSA_CRYPTO
373 psa_status_t status = psa_hash_compute(md_type, input, ilen,
374 output, output_size, &actual_len);
376 *output_len = actual_len;
377 return (status == PSA_SUCCESS) ? 0 : -1;
379 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_type);
382 size_t hash_len = mbedtls_md_get_size(md_info);
383 if (hash_len > output_size)
386 *output_len = hash_len;
387 return mbedtls_md(md_info, input, ilen, output);
394#if COAP_OSCORE_SUPPORT
396coap_crypto_hmac_compute(coap_crypto_md_type_t md_type,
397 const uint8_t *key,
size_t key_len,
398 const uint8_t *input,
size_t ilen,
399 uint8_t *output,
size_t output_size,
400 size_t *output_len) {
401#if COAP_USE_PSA_CRYPTO
402 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
404 psa_algorithm_t psa_alg = PSA_ALG_HMAC(md_type);
408 psa_set_key_type(&attributes, PSA_KEY_TYPE_HMAC);
409 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_MESSAGE);
410 psa_set_key_algorithm(&attributes, psa_alg);
412 if (psa_import_key(&attributes, key, key_len, &key_id) != PSA_SUCCESS) {
416 status = psa_mac_compute(key_id, psa_alg, input, ilen,
417 output, output_size, &mac_len);
418 psa_destroy_key(key_id);
421 *output_len = mac_len;
422 return (status == PSA_SUCCESS) ? 0 : -1;
424 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(md_type);
427 size_t mac_size = mbedtls_md_get_size(md_info);
428 if (mac_size > output_size)
431 *output_len = mac_size;
432 return mbedtls_md_hmac(md_info, key, key_len, input, ilen, output);
439coap_crypto_aead_encrypt_ccm(
const uint8_t *key,
size_t key_len,
440 const uint8_t *nonce,
size_t nonce_len,
441 const uint8_t *aad,
size_t aad_len,
442 const uint8_t *plaintext,
size_t plaintext_len,
443 uint8_t *ciphertext,
size_t ciphertext_size,
444 size_t *ciphertext_len,
size_t tag_len) {
445#if COAP_USE_PSA_CRYPTO
446 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
448 psa_algorithm_t psa_alg = PSA_ALG_AEAD_WITH_SHORTENED_TAG(PSA_ALG_CCM, tag_len);
452 psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
453 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_ENCRYPT);
454 psa_set_key_algorithm(&attributes, psa_alg);
455 psa_set_key_bits(&attributes, key_len * 8);
457 if (psa_import_key(&attributes, key, key_len, &key_id) != PSA_SUCCESS) {
461 status = psa_aead_encrypt(key_id, psa_alg,
464 plaintext, plaintext_len,
465 ciphertext, ciphertext_size, &output_len);
466 psa_destroy_key(key_id);
469 *ciphertext_len = output_len;
470 return (status == PSA_SUCCESS) ? 0 : -1;
472 mbedtls_cipher_context_t ctx;
473 const mbedtls_cipher_info_t *cipher_info;
474 mbedtls_cipher_type_t cipher_type;
476 size_t result_len = ciphertext_size;
479 cipher_type = MBEDTLS_CIPHER_AES_128_CCM;
480 }
else if (key_len == 32) {
481 cipher_type = MBEDTLS_CIPHER_AES_256_CCM;
486 cipher_info = mbedtls_cipher_info_from_type(cipher_type);
490 mbedtls_cipher_init(&ctx);
491 if (mbedtls_cipher_setup(&ctx, cipher_info) != 0)
493 if (mbedtls_cipher_setkey(&ctx, key, key_len * 8, MBEDTLS_ENCRYPT) != 0)
496#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
498 unsigned char tag[16];
499 if (mbedtls_cipher_auth_encrypt(&ctx,
502 plaintext, plaintext_len,
503 ciphertext, &result_len,
504 tag, tag_len) != 0) {
507 if ((result_len + tag_len) > ciphertext_size)
509 memcpy(ciphertext + result_len, tag, tag_len);
510 result_len += tag_len;
513 if (mbedtls_cipher_auth_encrypt_ext(&ctx,
516 plaintext, plaintext_len,
517 ciphertext, ciphertext_size,
518 &result_len, tag_len) != 0) {
524 *ciphertext_len = result_len;
528 mbedtls_cipher_free(&ctx);
534coap_crypto_aead_decrypt_ccm(
const uint8_t *key,
size_t key_len,
535 const uint8_t *nonce,
size_t nonce_len,
536 const uint8_t *aad,
size_t aad_len,
537 const uint8_t *ciphertext,
size_t ciphertext_len,
538 uint8_t *plaintext,
size_t plaintext_size,
539 size_t *plaintext_len,
size_t tag_len) {
540#if COAP_USE_PSA_CRYPTO
541 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
543 psa_algorithm_t psa_alg = PSA_ALG_AEAD_WITH_SHORTENED_TAG(PSA_ALG_CCM, tag_len);
547 psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
548 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DECRYPT);
549 psa_set_key_algorithm(&attributes, psa_alg);
550 psa_set_key_bits(&attributes, key_len * 8);
552 if (psa_import_key(&attributes, key, key_len, &key_id) != PSA_SUCCESS) {
556 status = psa_aead_decrypt(key_id, psa_alg,
559 ciphertext, ciphertext_len,
560 plaintext, plaintext_size, &output_len);
561 psa_destroy_key(key_id);
564 *plaintext_len = output_len;
565 return (status == PSA_SUCCESS) ? 0 : -1;
567 mbedtls_cipher_context_t ctx;
568 const mbedtls_cipher_info_t *cipher_info;
569 mbedtls_cipher_type_t cipher_type;
571 size_t result_len = plaintext_size;
574 cipher_type = MBEDTLS_CIPHER_AES_128_CCM;
575 }
else if (key_len == 32) {
576 cipher_type = MBEDTLS_CIPHER_AES_256_CCM;
581 cipher_info = mbedtls_cipher_info_from_type(cipher_type);
585 mbedtls_cipher_init(&ctx);
586 if (mbedtls_cipher_setup(&ctx, cipher_info) != 0)
588 if (mbedtls_cipher_setkey(&ctx, key, key_len * 8, MBEDTLS_DECRYPT) != 0)
591#if (MBEDTLS_VERSION_NUMBER < 0x02150000)
593 const unsigned char *tag = ciphertext + ciphertext_len - tag_len;
594 if (mbedtls_cipher_auth_decrypt(&ctx,
597 ciphertext, ciphertext_len - tag_len,
598 plaintext, &result_len,
599 tag, tag_len) != 0) {
604 if (mbedtls_cipher_auth_decrypt_ext(&ctx,
607 ciphertext, ciphertext_len,
608 plaintext, plaintext_size,
609 &result_len, tag_len) != 0) {
615 *plaintext_len = result_len;
619 mbedtls_cipher_free(&ctx);
627#if !COAP_USE_PSA_CRYPTO
628#ifndef MBEDTLS_2_X_COMPAT
633coap_rng(
void *ctx
COAP_UNUSED,
unsigned char *buf,
size_t len) {
634 return coap_prng_lkd(buf, len) ? 0 : MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED;
640coap_dgram_read(
void *ctx,
unsigned char *out,
size_t outl) {
645 if (!c_session->
tls) {
647 return MBEDTLS_ERR_SSL_WANT_READ;
649 data = &((coap_mbedtls_env_t *)c_session->
tls)->coap_ssl_data;
652 if (data->pdu_len > 0) {
653 if (outl < data->pdu_len) {
654 memcpy(out, data->pdu, outl);
657 data->pdu_len -= outl;
659 memcpy(out, data->pdu, data->pdu_len);
661 if (!data->peekmode) {
667 ret = MBEDTLS_ERR_SSL_WANT_READ;
681coap_dgram_write(
void *ctx,
const unsigned char *send_buffer,
682 size_t send_buffer_length) {
687 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
699 send_buffer, send_buffer_length);
700 if (result != (ssize_t)send_buffer_length) {
701 int keep_errno = errno;
704 result, send_buffer_length);
707 if (errno == ENOTCONN || errno == ECONNREFUSED)
716 m_env->last_timeout = now;
724#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) && defined(MBEDTLS_SSL_SRV_C)
729psk_server_callback(
void *p_info, mbedtls_ssl_context *ssl,
730 const unsigned char *identity,
size_t identity_len) {
733 coap_mbedtls_env_t *m_env;
737 if (c_session == NULL)
741 lidentity.
s = identity ? (
const uint8_t *)identity : (const uint8_t *)
"";
742 lidentity.
length = identity ? identity_len : 0;
746 (
int)lidentity.
length, (
const char *)lidentity.
s);
748 m_env = (coap_mbedtls_env_t *)c_session->
tls;
763 mbedtls_ssl_set_hs_psk(ssl, psk_key->
s, psk_key->
length);
764 m_env->seen_client_hello = 1;
770get_san_or_cn_from_cert(mbedtls_x509_crt *crt) {
772 const mbedtls_asn1_named_data *cn_data;
774 if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) {
775 mbedtls_asn1_sequence *seq = &crt->subject_alt_names;
776 while (seq && seq->buf.p == NULL) {
781 return mbedtls_strndup((
const char *)seq->buf.p,
786 cn_data = mbedtls_asn1_find_named_data(&crt->subject,
788 MBEDTLS_OID_SIZE(MBEDTLS_OID_AT_CN));
791 return mbedtls_strndup((
const char *)cn_data->val.p,
798#if COAP_MAX_LOGGING_LEVEL > 0
800get_error_string(
int ret) {
801 static char buf[128] = {0};
802 mbedtls_strerror(ret, buf,
sizeof(buf)-1);
808self_signed_cert_verify_callback_mbedtls(
void *data,
813 const coap_mbedtls_context_t *m_context =
817 if (*flags & MBEDTLS_X509_BADCERT_EXPIRED) {
819 *flags &= ~MBEDTLS_X509_BADCERT_EXPIRED;
830cert_verify_callback_mbedtls(
void *data, mbedtls_x509_crt *crt,
831 int depth, uint32_t *flags) {
833 coap_mbedtls_context_t *m_context =
841 cn = get_san_or_cn_from_cert(crt);
843 if (*flags & MBEDTLS_X509_BADCERT_EXPIRED) {
845 *flags &= ~MBEDTLS_X509_BADCERT_EXPIRED;
848 "The certificate has expired", cn ? cn :
"?", depth);
851 if (*flags & MBEDTLS_X509_BADCERT_FUTURE) {
853 *flags &= ~MBEDTLS_X509_BADCERT_FUTURE;
856 "The certificate has a future date", cn ? cn :
"?", depth);
859 if (*flags & MBEDTLS_X509_BADCERT_BAD_MD) {
861 *flags &= ~MBEDTLS_X509_BADCERT_BAD_MD;
864 "The certificate has a bad MD hash", cn ? cn :
"?", depth);
867 if (*flags & MBEDTLS_X509_BADCERT_BAD_KEY) {
869 *flags &= ~MBEDTLS_X509_BADCERT_BAD_KEY;
872 "The certificate has a short RSA length", cn ? cn :
"?", depth);
875 if (*flags & MBEDTLS_X509_BADCERT_NOT_TRUSTED) {
877 int self_signed = !mbedtls_x509_crt_verify(crt, crt, NULL, NULL, &lflags,
878 self_signed_cert_verify_callback_mbedtls,
880 if (self_signed && depth == 0) {
883 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
887 cn ? cn :
"?", depth);
889 }
else if (self_signed) {
891 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
894 "Self-signed", cn ? cn :
"?", depth);
898 *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED;
901 "The certificate's CA is not trusted", cn ? cn :
"?", depth);
905 if (*flags & MBEDTLS_X509_BADCRL_EXPIRED) {
907 *flags &= ~MBEDTLS_X509_BADCRL_EXPIRED;
910 "The certificate's CRL has expired", cn ? cn :
"?", depth);
912 *flags &= ~MBEDTLS_X509_BADCRL_EXPIRED;
915 if (*flags & MBEDTLS_X509_BADCRL_FUTURE) {
917 *flags &= ~MBEDTLS_X509_BADCRL_FUTURE;
920 "The certificate's CRL has a future date", cn ? cn :
"?", depth);
922 *flags &= ~MBEDTLS_X509_BADCRL_FUTURE;
927 *flags |= MBEDTLS_X509_BADCERT_OTHER;
930 "The certificate's verify depth is too long",
931 cn ? cn :
"?", depth);
934 if (*flags & MBEDTLS_X509_BADCERT_CN_MISMATCH) {
935 *flags &= ~MBEDTLS_X509_BADCERT_CN_MISMATCH;
949 *flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH;
955 int ret = mbedtls_x509_crt_verify_info(buf,
sizeof(buf),
"", *flags);
958 tcp = strchr(buf,
'\n');
963 buf, *flags, cn ? cn :
"?", depth);
964 tcp = strchr(tcp+1,
'\n');
967 coap_log_err(
"mbedtls_x509_crt_verify_info returned -0x%x: '%s'\n",
968 -ret, get_error_string(ret));
979setup_pki_credentials(mbedtls_x509_crt *cacert,
980 mbedtls_x509_crt *public_cert,
981 mbedtls_pk_context *private_key,
982 coap_mbedtls_env_t *m_env,
983 coap_mbedtls_context_t *m_context,
989 int done_private_key = 0;
990 int done_public_cert = 0;
1008#if defined(MBEDTLS_FS_IO)
1009 mbedtls_pk_init(private_key);
1010#if COAP_USE_PSA_CRYPTO
1011 ret = mbedtls_pk_parse_keyfile(private_key,
1013#elif defined(MBEDTLS_2_X_COMPAT)
1014 ret = mbedtls_pk_parse_keyfile(private_key,
1017 ret = mbedtls_pk_parse_keyfile(private_key,
1019 NULL, coap_rng, (
void *)&m_env->ctr_drbg);
1026 done_private_key = 1;
1034 mbedtls_pk_init(private_key);
1038 buffer = mbedtls_malloc(length + 1);
1044 buffer[length] =
'\000';
1046#if COAP_USE_PSA_CRYPTO
1047 ret = mbedtls_pk_parse_key(private_key, buffer, length, NULL, 0);
1048#elif defined(MBEDTLS_2_X_COMPAT)
1049 ret = mbedtls_pk_parse_key(private_key, buffer, length, NULL, 0);
1051 ret = mbedtls_pk_parse_key(private_key, buffer, length,
1052 NULL, 0, coap_rng, (
void *)&m_env->ctr_drbg);
1054 mbedtls_free(buffer);
1056#if COAP_USE_PSA_CRYPTO
1057 ret = mbedtls_pk_parse_key(private_key,
1060#elif defined(MBEDTLS_2_X_COMPAT)
1061 ret = mbedtls_pk_parse_key(private_key,
1065 ret = mbedtls_pk_parse_key(private_key,
1068 NULL, 0, coap_rng, (
void *)&m_env->ctr_drbg);
1076 done_private_key = 1;
1079 mbedtls_pk_init(private_key);
1080#if COAP_USE_PSA_CRYPTO
1081 ret = mbedtls_pk_parse_key(private_key,
1084#elif defined(MBEDTLS_2_X_COMPAT)
1085 ret = mbedtls_pk_parse_key(private_key,
1089 ret = mbedtls_pk_parse_key(private_key,
1092 (
void *)&m_env->ctr_drbg);
1099 done_private_key = 1;
1127#if defined(MBEDTLS_FS_IO)
1128 mbedtls_x509_crt_init(public_cert);
1129 ret = mbedtls_x509_crt_parse_file(public_cert,
1136 done_public_cert = 1;
1144 mbedtls_x509_crt_init(public_cert);
1149 buffer = mbedtls_malloc(length + 1);
1155 buffer[length] =
'\000';
1157 ret = mbedtls_x509_crt_parse(public_cert, buffer, length);
1158 mbedtls_free(buffer);
1160 ret = mbedtls_x509_crt_parse(public_cert,
1169 done_public_cert = 1;
1176 mbedtls_x509_crt_init(public_cert);
1177 ret = mbedtls_x509_crt_parse(public_cert,
1185 done_public_cert = 1;
1203 if (done_private_key && done_public_cert) {
1204 ret = mbedtls_ssl_conf_own_cert(&m_env->conf, public_cert, private_key);
1206 coap_log_err(
"mbedtls_ssl_conf_own_cert returned -0x%x: '%s'\n",
1207 -ret, get_error_string(ret));
1222#if defined(MBEDTLS_FS_IO)
1223 mbedtls_x509_crt_init(cacert);
1224 ret = mbedtls_x509_crt_parse_file(cacert,
1231 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1239 mbedtls_x509_crt_init(cacert);
1243 buffer = mbedtls_malloc(length + 1);
1249 buffer[length] =
'\000';
1251 ret = mbedtls_x509_crt_parse(cacert, buffer, length);
1252 mbedtls_free(buffer);
1254 ret = mbedtls_x509_crt_parse(cacert,
1263 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1270 mbedtls_x509_crt_init(cacert);
1271 ret = mbedtls_x509_crt_parse(cacert,
1279 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1293#if defined(MBEDTLS_FS_IO)
1294 if (m_context->root_ca_file) {
1295 ret = mbedtls_x509_crt_parse_file(cacert, m_context->root_ca_file);
1302 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1304 if (m_context->root_ca_path) {
1305 ret = mbedtls_x509_crt_parse_path(cacert, m_context->root_ca_path);
1312 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1314#if MBEDTLS_VERSION_NUMBER >= 0x04000000
1315 if (m_context->trust_store_defined)
1317 if (m_context->trust_store_defined ||
1322 const char *trust_list[] = {
1323 "/etc/ssl/ca-bundle.pem",
1324 "/etc/ssl/certs/ca-certificates.crt",
1325 "/etc/pki/tls/cert.pem",
1326 "/usr/local/share/certs/ca-root-nss.crt",
1329 static const char *trust_file_found = NULL;
1330 static int trust_file_done = 0;
1333 if (trust_file_found) {
1334 ret = mbedtls_x509_crt_parse_file(cacert, trust_file_found);
1336 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1341 }
else if (!trust_file_done) {
1342 trust_file_done = 1;
1343 for (i = 0; i <
sizeof(trust_list)/
sizeof(trust_list[0]); i++) {
1344 ret = mbedtls_x509_crt_parse_file(cacert, trust_list[i]);
1346 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL);
1347 trust_file_found = trust_list[i];
1351 if (i ==
sizeof(trust_list)/
sizeof(trust_list[0])) {
1357 if (m_context->root_ca_file || m_context->root_ca_path ||
1358 m_context->trust_store_defined) {
1366#if defined(MBEDTLS_SSL_SRV_C)
1367 mbedtls_ssl_conf_cert_req_ca_list(&m_env->conf,
1369 MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED :
1370 MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED);
1373 MBEDTLS_SSL_VERIFY_REQUIRED :
1374 MBEDTLS_SSL_VERIFY_NONE);
1379 mbedtls_ssl_conf_verify(&m_env->conf,
1380 cert_verify_callback_mbedtls, c_session);
1385#if defined(MBEDTLS_SSL_SRV_C)
1390pki_sni_callback(
void *p_info, mbedtls_ssl_context *ssl,
1391 const unsigned char *uname,
size_t name_len) {
1395 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
1396 coap_mbedtls_context_t *m_context =
1400 name = mbedtls_malloc(name_len+1);
1404 memcpy(name, uname, name_len);
1405 name[name_len] =
'\000';
1408 for (i = 0; i < m_context->pki_sni_count; i++) {
1409 if (strcasecmp(name, m_context->pki_sni_entry_list[i].sni) == 0) {
1413 if (i == m_context->pki_sni_count) {
1418 pki_sni_entry *pki_sni_entry_list;
1421 m_context->setup_data.validate_sni_call_back(name,
1422 m_context->setup_data.sni_call_back_arg));
1428 pki_sni_entry_list = mbedtls_realloc(m_context->pki_sni_entry_list,
1429 (i+1)*
sizeof(pki_sni_entry));
1431 if (pki_sni_entry_list == NULL) {
1435 m_context->pki_sni_entry_list = pki_sni_entry_list;
1436 memset(&m_context->pki_sni_entry_list[i], 0,
1437 sizeof(m_context->pki_sni_entry_list[i]));
1438 m_context->pki_sni_entry_list[i].sni = name;
1439 m_context->pki_sni_entry_list[i].pki_key = *new_entry;
1440 sni_setup_data = m_context->setup_data;
1441 sni_setup_data.pki_key = *new_entry;
1442 if (setup_pki_credentials(&m_context->pki_sni_entry_list[i].cacert,
1443 &m_context->pki_sni_entry_list[i].public_cert,
1444 &m_context->pki_sni_entry_list[i].private_key,
1453 m_context->pki_sni_count++;
1458 mbedtls_ssl_set_hs_ca_chain(ssl, &m_context->pki_sni_entry_list[i].cacert,
1460 return mbedtls_ssl_set_hs_own_cert(ssl,
1461 &m_context->pki_sni_entry_list[i].public_cert,
1462 &m_context->pki_sni_entry_list[i].private_key);
1465#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1470psk_sni_callback(
void *p_info, mbedtls_ssl_context *ssl,
1471 const unsigned char *uname,
size_t name_len) {
1474 coap_mbedtls_context_t *m_context =
1478 name = mbedtls_malloc(name_len+1);
1482 memcpy(name, uname, name_len);
1483 name[name_len] =
'\000';
1486 for (i = 0; i < m_context->psk_sni_count; i++) {
1487 if (strcasecmp(name, m_context->psk_sni_entry_list[i].sni) == 0) {
1491 if (i == m_context->psk_sni_count) {
1496 psk_sni_entry *psk_sni_entry_list;
1507 psk_sni_entry_list = mbedtls_realloc(m_context->psk_sni_entry_list,
1508 (i+1)*
sizeof(psk_sni_entry));
1510 if (psk_sni_entry_list == NULL) {
1514 m_context->psk_sni_entry_list = psk_sni_entry_list;
1515 m_context->psk_sni_entry_list[i].sni = name;
1516 m_context->psk_sni_entry_list[i].psk_info = *new_entry;
1518 m_context->psk_sni_count++;
1524 &m_context->psk_sni_entry_list[i].psk_info.hint);
1526 &m_context->psk_sni_entry_list[i].psk_info.key);
1527#if MBEDTLS_VERSION_NUMBER >= 0x04000000
1531 return mbedtls_ssl_set_hs_psk(ssl,
1532 m_context->psk_sni_entry_list[i].psk_info.key.s,
1533 m_context->psk_sni_entry_list[i].psk_info.key.length);
1540 coap_mbedtls_env_t *m_env) {
1541 coap_mbedtls_context_t *m_context =
1544 m_context->psk_pki_enabled |= IS_SERVER;
1546 mbedtls_ssl_cookie_init(&m_env->cookie_ctx);
1547 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1548 MBEDTLS_SSL_IS_SERVER,
1550 MBEDTLS_SSL_TRANSPORT_DATAGRAM :
1551 MBEDTLS_SSL_TRANSPORT_STREAM,
1552 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
1553 coap_log_err(
"mbedtls_ssl_config_defaults returned -0x%x: '%s'\n",
1554 -ret, get_error_string(ret));
1558#if !COAP_USE_PSA_CRYPTO
1559 mbedtls_ssl_conf_rng(&m_env->conf, mbedtls_ctr_drbg_random, &m_env->ctr_drbg);
1562#if defined(MBEDTLS_SSL_PROTO_DTLS)
1563 mbedtls_ssl_conf_handshake_timeout(&m_env->conf, COAP_DTLS_RETRANSMIT_MS,
1564 COAP_DTLS_RETRANSMIT_TOTAL_MS);
1567 if (m_context->psk_pki_enabled & IS_PSK) {
1568#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1569 mbedtls_ssl_conf_psk_cb(&m_env->conf, psk_server_callback, c_session);
1571 mbedtls_ssl_conf_sni(&m_env->conf, psk_sni_callback, c_session);
1573#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1581 if (m_context->psk_pki_enabled & IS_PKI) {
1582 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1583 &m_env->private_key, m_env, m_context,
1584 c_session, &m_context->setup_data,
1590 if (m_context->setup_data.validate_sni_call_back) {
1591 mbedtls_ssl_conf_sni(&m_env->conf, pki_sni_callback, c_session);
1595#if COAP_USE_PSA_CRYPTO
1596 if ((ret = mbedtls_ssl_cookie_setup(&m_env->cookie_ctx)) != 0) {
1598 if ((ret = mbedtls_ssl_cookie_setup(&m_env->cookie_ctx,
1599 mbedtls_ctr_drbg_random,
1600 &m_env->ctr_drbg)) != 0) {
1602 coap_log_err(
"mbedtls_ssl_cookie_setup: returned -0x%x: '%s'\n",
1603 -ret, get_error_string(ret));
1607#if defined(MBEDTLS_SSL_PROTO_DTLS)
1608 mbedtls_ssl_conf_dtls_cookies(&m_env->conf, mbedtls_ssl_cookie_write,
1609 mbedtls_ssl_cookie_check,
1610 &m_env->cookie_ctx);
1611#if MBEDTLS_VERSION_NUMBER >= 0x02100100
1612 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
1615#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
1623 mbedtls_ssl_conf_cid(&m_env->conf, COAP_DTLS_CID_LENGTH, MBEDTLS_SSL_UNEXPECTED_CID_IGNORE);
1630#if COAP_CLIENT_SUPPORT
1631static int *psk_ciphers = NULL;
1632static int *pki_ciphers = NULL;
1633static int *ecjpake_ciphers = NULL;
1634static int processed_ciphers = 0;
1636#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1638coap_ssl_ciphersuite_uses_psk(
const mbedtls_ssl_ciphersuite_t *info) {
1639#if COAP_USE_PSA_CRYPTO
1640 switch (info->key_exchange) {
1641 case MBEDTLS_KEY_EXCHANGE_PSK:
1642 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
1644 case MBEDTLS_KEY_EXCHANGE_NONE:
1645 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
1646 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
1647 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
1651#elif MBEDTLS_VERSION_NUMBER >= 0x03060000
1652 switch (info->key_exchange) {
1653 case MBEDTLS_KEY_EXCHANGE_PSK:
1654 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
1655 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
1656 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
1658 case MBEDTLS_KEY_EXCHANGE_NONE:
1659 case MBEDTLS_KEY_EXCHANGE_RSA:
1660 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
1661 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
1662 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
1663 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
1664 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
1665 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
1670 return mbedtls_ssl_ciphersuite_uses_psk(info);
1676set_ciphersuites(mbedtls_ssl_config *conf, coap_enc_method_t method) {
1677 if (!processed_ciphers) {
1678 const int *list = mbedtls_ssl_list_ciphersuites();
1679 const int *base = list;
1682#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1684 int ecjpake_count = 1;
1690 const mbedtls_ssl_ciphersuite_t *cur =
1691 mbedtls_ssl_ciphersuite_from_id(*list);
1694#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1695 if (cur->max_tls_version < MBEDTLS_SSL_VERSION_TLS1_2) {
1699 if (cur->max_minor_ver < MBEDTLS_SSL_MINOR_VERSION_3) {
1703#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1704 else if (cur->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
1708#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1709 else if (cur->min_tls_version >= MBEDTLS_SSL_VERSION_TLS1_3) {
1714#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1715 else if (coap_ssl_ciphersuite_uses_psk(cur)) {
1727 psk_ciphers = mbedtls_malloc(psk_count *
sizeof(psk_ciphers[0]));
1728 if (psk_ciphers == NULL) {
1729 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", psk_count);
1732 pki_ciphers = mbedtls_malloc(pki_count *
sizeof(pki_ciphers[0]));
1733 if (pki_ciphers == NULL) {
1734 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", pki_count);
1735 mbedtls_free(psk_ciphers);
1739#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1740 ecjpake_ciphers = mbedtls_malloc(ecjpake_count *
sizeof(ecjpake_ciphers[0]));
1741 if (ecjpake_ciphers == NULL) {
1742 coap_log_err(
"set_ciphers: mbedtls_malloc with count %d failed\n", pki_count);
1743 mbedtls_free(psk_ciphers);
1744 mbedtls_free(pki_ciphers);
1751 psk_list = psk_ciphers;
1752 pki_list = pki_ciphers;
1753#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1754 ecjpake_list = ecjpake_ciphers;
1758 const mbedtls_ssl_ciphersuite_t *cur =
1759 mbedtls_ssl_ciphersuite_from_id(*list);
1761#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1762 if (cur->max_tls_version < MBEDTLS_SSL_VERSION_TLS1_2) {
1766 if (cur->max_minor_ver < MBEDTLS_SSL_MINOR_VERSION_3) {
1770#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
1771 else if (cur->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
1772 *ecjpake_list = *list;
1776#if MBEDTLS_VERSION_NUMBER >= 0x03060000
1777 else if (cur->min_tls_version >= MBEDTLS_SSL_VERSION_TLS1_3) {
1784#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1785 else if (coap_ssl_ciphersuite_uses_psk(cur)) {
1800 processed_ciphers = 1;
1804 mbedtls_ssl_conf_ciphersuites(conf, psk_ciphers);
1807 mbedtls_ssl_conf_ciphersuites(conf, pki_ciphers);
1809 case COAP_ENC_ECJPAKE:
1810 mbedtls_ssl_conf_ciphersuites(conf, ecjpake_ciphers);
1820 coap_mbedtls_env_t *m_env) {
1823 coap_mbedtls_context_t *m_context =
1826 m_context->psk_pki_enabled |= IS_CLIENT;
1828 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1829 MBEDTLS_SSL_IS_CLIENT,
1831 MBEDTLS_SSL_TRANSPORT_DATAGRAM :
1832 MBEDTLS_SSL_TRANSPORT_STREAM,
1833 MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
1834 coap_log_err(
"mbedtls_ssl_config_defaults returned -0x%x: '%s'\n",
1835 -ret, get_error_string(ret));
1839#if defined(MBEDTLS_SSL_PROTO_DTLS)
1840 mbedtls_ssl_conf_handshake_timeout(&m_env->conf, COAP_DTLS_RETRANSMIT_MS,
1841 COAP_DTLS_RETRANSMIT_TOTAL_MS);
1844 mbedtls_ssl_conf_authmode(&m_env->conf, MBEDTLS_SSL_VERIFY_REQUIRED);
1845#if !COAP_USE_PSA_CRYPTO
1846 mbedtls_ssl_conf_rng(&m_env->conf, mbedtls_ctr_drbg_random, &m_env->ctr_drbg);
1849 if (m_context->psk_pki_enabled & IS_PSK) {
1850#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
1858 if (psk_key == NULL || psk_identity == NULL) {
1859 ret = MBEDTLS_ERR_SSL_ALLOC_FAILED;
1863 if ((ret = mbedtls_ssl_conf_psk(&m_env->conf, psk_key->
s,
1864 psk_key->
length, psk_identity->
s,
1865 psk_identity->
length)) != 0) {
1866 coap_log_err(
"mbedtls_ssl_conf_psk returned -0x%x: '%s'\n",
1867 -ret, get_error_string(ret));
1871 if ((ret = mbedtls_ssl_set_hostname(&m_env->ssl,
1873 coap_log_err(
"mbedtls_ssl_set_hostname returned -0x%x: '%s'\n",
1874 -ret, get_error_string(ret));
1880#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
1882 m_env->ec_jpake = 1;
1883 set_ciphersuites(&m_env->conf, COAP_ENC_ECJPAKE);
1884#if MBEDTLS_VERSION_NUMBER >= 0x03020000
1885 mbedtls_ssl_conf_max_tls_version(&m_env->conf, MBEDTLS_SSL_VERSION_TLS1_2);
1888 set_ciphersuites(&m_env->conf, COAP_ENC_PSK);
1891 set_ciphersuites(&m_env->conf, COAP_ENC_PSK);
1896 }
else if ((m_context->psk_pki_enabled & IS_PKI) ||
1897 (m_context->psk_pki_enabled & (IS_PSK | IS_PKI)) == 0) {
1904 if (!(m_context->psk_pki_enabled & IS_PKI)) {
1918 mbedtls_ssl_conf_authmode(&m_env->conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
1919 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1920 &m_env->private_key, m_env, m_context,
1921 c_session, setup_data,
1927#if defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_SSL_ALPN)
1930 static const char *alpn_list[] = {
"coap", NULL };
1932 ret = mbedtls_ssl_conf_alpn_protocols(&m_env->conf, alpn_list);
1938 mbedtls_ssl_set_hostname(&m_env->ssl, m_context->setup_data.client_sni);
1939#if defined(MBEDTLS_SSL_PROTO_DTLS)
1940#if MBEDTLS_VERSION_NUMBER >= 0x02100100
1941 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
1944 set_ciphersuites(&m_env->conf, COAP_ENC_PKI);
1954mbedtls_cleanup(coap_mbedtls_env_t *m_env) {
1959 mbedtls_x509_crt_free(&m_env->cacert);
1960 mbedtls_x509_crt_free(&m_env->public_cert);
1961 mbedtls_pk_free(&m_env->private_key);
1962#if !COAP_USE_PSA_CRYPTO
1963 mbedtls_entropy_free(&m_env->entropy);
1964 mbedtls_ctr_drbg_free(&m_env->ctr_drbg);
1966 mbedtls_ssl_config_free(&m_env->conf);
1967 mbedtls_ssl_free(&m_env->ssl);
1968 mbedtls_ssl_cookie_free(&m_env->cookie_ctx);
1972coap_dtls_free_mbedtls_env(coap_mbedtls_env_t *m_env) {
1974 if (!m_env->sent_alert)
1975 mbedtls_ssl_close_notify(&m_env->ssl);
1976 mbedtls_cleanup(m_env);
1977 mbedtls_free(m_env);
1981#if COAP_MAX_LOGGING_LEVEL > 0
1983report_mbedtls_alert(
unsigned char alert) {
1985 case MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC:
1986 return ": Bad Record MAC";
1987 case MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE:
1988 return ": Handshake failure";
1989 case MBEDTLS_SSL_ALERT_MSG_NO_CERT:
1990 return ": No Certificate provided";
1991 case MBEDTLS_SSL_ALERT_MSG_BAD_CERT:
1992 return ": Certificate is bad";
1993 case MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN:
1994 return ": Certificate is unknown";
1995 case MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA:
1996 return ": CA is unknown";
1997 case MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED:
1998 return ": Access was denied";
1999 case MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR:
2000 return ": Decrypt error";
2014 coap_mbedtls_env_t *m_env) {
2018 ret = mbedtls_ssl_handshake(&m_env->ssl);
2021 m_env->established = 1;
2025#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2026#if COAP_CLIENT_SUPPORT
2029 coap_mbedtls_context_t *m_context;
2033 m_context->setup_data.use_cid) {
2034 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX];
2036 size_t peer_cid_len;
2039 if (mbedtls_ssl_get_peer_cid(&m_env->ssl, &enabled, peer_cid, &peer_cid_len) == 0 &&
2040 enabled == MBEDTLS_SSL_CID_ENABLED) {
2051 case MBEDTLS_ERR_SSL_WANT_READ:
2052 case MBEDTLS_ERR_SSL_WANT_WRITE:
2053 if (m_env->ssl.state == MBEDTLS_SSL_SERVER_HELLO
2054#
if MBEDTLS_VERSION_NUMBER >= 0x03030000
2055 || m_env->ssl.state == MBEDTLS_SSL_NEW_SESSION_TICKET
2058 if (++m_env->server_hello_cnt > 10) {
2066 case MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED:
2069 case MBEDTLS_ERR_SSL_INVALID_MAC:
2071#ifdef MBEDTLS_2_X_COMPAT
2072 case MBEDTLS_ERR_SSL_UNKNOWN_CIPHER:
2074 case MBEDTLS_ERR_SSL_DECODE_ERROR:
2077 case MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE:
2078 alert = MBEDTLS_SSL_ALERT_MSG_NO_CERT;
2080#ifdef MBEDTLS_2_X_COMPAT
2081 case MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO:
2082 case MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO:
2083 alert = MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE;
2086 case MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:
2088 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2089 if (m_env->ssl.in_msg[1] != MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY)
2092 report_mbedtls_alert(m_env->ssl.in_msg[1]));
2094 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
2095 case MBEDTLS_ERR_SSL_CONN_EOF:
2096 case MBEDTLS_ERR_NET_CONN_RESET:
2102 "returned -0x%x: '%s'\n",
2103 -ret, get_error_string(ret));
2110 mbedtls_ssl_send_alert_message(&m_env->ssl,
2111 MBEDTLS_SSL_ALERT_LEVEL_FATAL,
2113 m_env->sent_alert = 1;
2118 get_error_string(ret));
2120 mbedtls_ssl_session_reset(&m_env->ssl);
2121#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2122 if (m_env->ec_jpake) {
2125#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
2131#elif COAP_CLIENT_SUPPORT
2137 mbedtls_ssl_set_hs_ecjpake_password(&m_env->ssl, psk_key->
s, psk_key->
length);
2145mbedtls_debug_out(
void *ctx
COAP_UNUSED,
int level,
2178#if !COAP_DISABLE_TCP
2186coap_sock_read(
void *ctx,
unsigned char *out,
size_t outl) {
2187 int ret = MBEDTLS_ERR_SSL_CONN_EOF;
2194 if (errno == ECONNRESET) {
2196 ret = MBEDTLS_ERR_SSL_CONN_EOF;
2198 ret = MBEDTLS_ERR_NET_RECV_FAILED;
2200 }
else if (ret == 0) {
2202 ret = MBEDTLS_ERR_SSL_WANT_READ;
2215coap_sock_write(
void *context,
const unsigned char *in,
size_t inl) {
2220 (
const uint8_t *)in,
2226 (errno == EPIPE || errno == ECONNRESET)) {
2241 int lasterror = WSAGetLastError();
2243 if (lasterror == WSAEWOULDBLOCK) {
2244 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
2245 }
else if (lasterror == WSAECONNRESET) {
2246 ret = MBEDTLS_ERR_NET_CONN_RESET;
2249 if (errno == EAGAIN || errno == EINTR) {
2250 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
2251 }
else if (errno == EPIPE || errno == ECONNRESET) {
2252 ret = MBEDTLS_ERR_NET_CONN_RESET;
2256 ret = MBEDTLS_ERR_NET_SEND_FAILED;
2265 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
2271static coap_mbedtls_env_t *
2275#if !COAP_USE_PSA_CRYPTO
2278 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2283 m_env = (coap_mbedtls_env_t *)mbedtls_malloc(
sizeof(coap_mbedtls_env_t));
2287 memset(m_env, 0,
sizeof(coap_mbedtls_env_t));
2289 mbedtls_ssl_init(&m_env->ssl);
2290#if !COAP_USE_PSA_CRYPTO
2291 mbedtls_ctr_drbg_init(&m_env->ctr_drbg);
2292 mbedtls_entropy_init(&m_env->entropy);
2294 mbedtls_ssl_config_init(&m_env->conf);
2296#if defined(ESPIDF_VERSION) && defined(CONFIG_MBEDTLS_DEBUG)
2297 mbedtls_esp_enable_debug_log(&m_env->conf, CONFIG_MBEDTLS_DEBUG_LEVEL);
2300#if !COAP_USE_PSA_CRYPTO
2301 if ((ret = mbedtls_ctr_drbg_seed(&m_env->ctr_drbg,
2302 mbedtls_entropy_func, &m_env->entropy, NULL, 0)) != 0) {
2303 if (ret != MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED) {
2304 coap_log_info(
"mbedtls_ctr_drbg_seed returned -0x%x: '%s'\n",
2305 -ret, get_error_string(ret));
2308 coap_log_err(
"mbedtls_ctr_drbg_seed returned -0x%x: '%s'\n",
2309 -ret, get_error_string(ret));
2314#if COAP_CLIENT_SUPPORT
2315 if (setup_client_ssl_session(c_session, m_env) != 0) {
2322#if defined(MBEDTLS_SSL_SRV_C)
2323 if (setup_server_ssl_session(c_session, m_env) != 0) {
2333#if MBEDTLS_VERSION_NUMBER >= 0x03020000
2334 mbedtls_ssl_conf_min_tls_version(&m_env->conf, MBEDTLS_SSL_VERSION_TLS1_2);
2336 mbedtls_ssl_conf_min_version(&m_env->conf, MBEDTLS_SSL_MAJOR_VERSION_3,
2337 MBEDTLS_SSL_MINOR_VERSION_3);
2340 if (mbedtls_ssl_setup(&m_env->ssl, &m_env->conf) != 0) {
2344 mbedtls_ssl_set_bio(&m_env->ssl, c_session, coap_dgram_write,
2345 coap_dgram_read, NULL);
2346#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2349#if COAP_CLIENT_SUPPORT
2350 coap_mbedtls_context_t *m_context =
2354 m_context->setup_data.use_cid) {
2362 mbedtls_ssl_set_cid(&m_env->ssl, MBEDTLS_SSL_CID_ENABLED, NULL, 0);
2366#if COAP_SERVER_SUPPORT
2367 uint8_t cid[COAP_DTLS_CID_LENGTH];
2376 mbedtls_ssl_set_cid(&m_env->ssl, MBEDTLS_SSL_CID_ENABLED, cid,
2384#if !COAP_DISABLE_TCP
2387 mbedtls_ssl_set_bio(&m_env->ssl, c_session, coap_sock_write,
2388 coap_sock_read, NULL);
2391#ifdef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2392 coap_mbedtls_context_t *m_context =
2394 if ((m_context->psk_pki_enabled & IS_PSK) &&
2398#if COAP_CLIENT_SUPPORT && COAP_SERVER_SUPPORT
2404#elif COAP_CLIENT_SUPPORT
2409 mbedtls_ssl_set_hs_ecjpake_password(&m_env->ssl, psk_key->
s, psk_key->
length);
2413 mbedtls_ssl_set_timer_cb(&m_env->ssl, &m_env->timer,
2414 zephyr_timing_set_delay,
2415 zephyr_timing_get_delay);
2417 mbedtls_ssl_set_timer_cb(&m_env->ssl, &m_env->timer,
2418 mbedtls_timing_set_delay,
2419 mbedtls_timing_get_delay);
2422 mbedtls_ssl_conf_dbg(&m_env->conf, mbedtls_debug_out, stdout);
2427 mbedtls_free(m_env);
2434#if defined(MBEDTLS_SSL_PROTO_DTLS)
2437 static int reported = 0;
2441 " - update Mbed TLS to include DTLS\n");
2449#if !COAP_DISABLE_TCP
2498#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2505#if COAP_CLIENT_SUPPORT
2508#ifdef MBEDTLS_SSL_DTLS_CONNECTION_ID
2521 coap_mbedtls_context_t *m_context;
2524 m_context = (coap_mbedtls_context_t *)mbedtls_malloc(
sizeof(coap_mbedtls_context_t));
2526 memset(m_context, 0,
sizeof(coap_mbedtls_context_t));
2531#if COAP_SERVER_SUPPORT
2540 coap_mbedtls_context_t *m_context =
2543#if !defined(MBEDTLS_SSL_SRV_C)
2545 " libcoap not compiled for Server Mode for Mbed TLS"
2546 " - update Mbed TLS to include Server Mode\n");
2549 if (!m_context || !setup_data)
2553#ifndef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2554 coap_log_warn(
"Mbed TLS not compiled for EC-JPAKE support\n");
2557 m_context->psk_pki_enabled |= IS_PSK;
2562#if COAP_CLIENT_SUPPORT
2571#if !defined(MBEDTLS_SSL_CLI_C)
2576 " libcoap not compiled for Client Mode for Mbed TLS"
2577 " - update Mbed TLS to include Client Mode\n");
2580 coap_mbedtls_context_t *m_context =
2583 if (!m_context || !setup_data)
2587 coap_log_warn(
"CoAP Client with Mbed TLS does not support Identity Hint selection\n");
2590#ifndef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
2591 coap_log_warn(
"Mbed TLS not compiled for EC-JPAKE support\n");
2595#ifndef MBEDTLS_SSL_DTLS_CONNECTION_ID
2596 coap_log_warn(
"Mbed TLS not compiled for Connection-ID support\n");
2599 m_context->psk_pki_enabled |= IS_PSK;
2609 coap_mbedtls_context_t *m_context =
2612 m_context->setup_data = *setup_data;
2613 if (!m_context->setup_data.verify_peer_cert) {
2615 m_context->setup_data.check_common_ca = 0;
2617 m_context->setup_data.allow_self_signed = 1;
2618 m_context->setup_data.allow_expired_certs = 1;
2619 m_context->setup_data.cert_chain_validation = 1;
2620 m_context->setup_data.cert_chain_verify_depth = 10;
2621 m_context->setup_data.check_cert_revocation = 1;
2622 m_context->setup_data.allow_no_crl = 1;
2623 m_context->setup_data.allow_expired_crl = 1;
2624 m_context->setup_data.allow_bad_md_hash = 1;
2625 m_context->setup_data.allow_short_rsa_length = 1;
2627 m_context->psk_pki_enabled |= IS_PKI;
2629#ifndef MBEDTLS_SSL_DTLS_CONNECTION_ID
2630 coap_log_warn(
"Mbed TLS not compiled for Connection-ID support\n");
2638 const char *ca_file,
2639 const char *ca_path) {
2640 coap_mbedtls_context_t *m_context =
2644 coap_log_warn(
"coap_context_set_pki_root_cas: (D)TLS environment "
2649 if (ca_file == NULL && ca_path == NULL) {
2650 coap_log_warn(
"coap_context_set_pki_root_cas: ca_file and/or ca_path "
2654 if (m_context->root_ca_file) {
2655 mbedtls_free(m_context->root_ca_file);
2656 m_context->root_ca_file = NULL;
2660 m_context->root_ca_file = mbedtls_strdup(ca_file);
2663 if (m_context->root_ca_path) {
2664 mbedtls_free(m_context->root_ca_path);
2665 m_context->root_ca_path = NULL;
2669 m_context->root_ca_path = mbedtls_strdup(ca_path);
2680 coap_mbedtls_context_t *m_context =
2684 coap_log_warn(
"coap_context_load_pki_trust_store: (D)TLS environment "
2688 m_context->trust_store_defined = 1;
2697 coap_mbedtls_context_t *m_context =
2699 return m_context->psk_pki_enabled ? 1 : 0;
2704 coap_mbedtls_context_t *m_context = (coap_mbedtls_context_t *)dtls_context;
2707 for (i = 0; i < m_context->pki_sni_count; i++) {
2708 mbedtls_free(m_context->pki_sni_entry_list[i].sni);
2710 mbedtls_x509_crt_free(&m_context->pki_sni_entry_list[i].public_cert);
2712 mbedtls_pk_free(&m_context->pki_sni_entry_list[i].private_key);
2714 mbedtls_x509_crt_free(&m_context->pki_sni_entry_list[i].cacert);
2716 if (m_context->pki_sni_entry_list)
2717 mbedtls_free(m_context->pki_sni_entry_list);
2719 for (i = 0; i < m_context->psk_sni_count; i++) {
2720 mbedtls_free(m_context->psk_sni_entry_list[i].sni);
2722 if (m_context->psk_sni_entry_list)
2723 mbedtls_free(m_context->psk_sni_entry_list);
2725 if (m_context->root_ca_path)
2726 mbedtls_free(m_context->root_ca_path);
2727 if (m_context->root_ca_file)
2728 mbedtls_free(m_context->root_ca_file);
2730 mbedtls_free(m_context);
2733#if COAP_CLIENT_SUPPORT
2736#if !defined(MBEDTLS_SSL_CLI_C)
2739 " libcoap not compiled for Client Mode for Mbed TLS"
2740 " - update Mbed TLS to include Client Mode\n");
2743 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
2752 m_env->last_timeout = now;
2753 ret = do_mbedtls_handshake(c_session, m_env);
2755 coap_dtls_free_mbedtls_env(m_env);
2764#if COAP_SERVER_SUPPORT
2767#if !defined(MBEDTLS_SSL_SRV_C)
2770 " libcoap not compiled for Server Mode for Mbed TLS"
2771 " - update Mbed TLS to include Server Mode\n");
2774 coap_mbedtls_env_t *m_env =
2775 (coap_mbedtls_env_t *)c_session->
tls;
2777#if defined(MBEDTLS_SSL_PROTO_DTLS)
2778#if MBEDTLS_VERSION_NUMBER >= 0x02100100
2779 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
2790 if (c_session && c_session->
context && c_session->
tls) {
2791 coap_dtls_free_mbedtls_env(c_session->
tls);
2792 c_session->
tls = NULL;
2800#if defined(MBEDTLS_SSL_PROTO_DTLS)
2801 coap_mbedtls_env_t *m_env =
2802 (coap_mbedtls_env_t *)c_session->
tls;
2804#if MBEDTLS_VERSION_NUMBER >= 0x02100100
2805 mbedtls_ssl_set_mtu(&m_env->ssl, (uint16_t)c_session->
mtu);
2815 const uint8_t *data,
size_t data_len) {
2817 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2819 assert(m_env != NULL);
2827 if (m_env->established) {
2828 ret = mbedtls_ssl_write(&m_env->ssl, (
const unsigned char *) data, data_len);
2831 case MBEDTLS_ERR_SSL_WANT_READ:
2832 case MBEDTLS_ERR_SSL_WANT_WRITE:
2835 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2841 "returned -0x%x: '%s'\n",
2842 -ret, get_error_string(ret));
2851 ret = do_mbedtls_handshake(c_session, m_env);
2884 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2886 int ret = zephyr_timing_get_delay(&m_env->timer);
2888 int ret = mbedtls_timing_get_delay(&m_env->timer);
2890 unsigned int scalar = 1 << m_env->retry_scalar;
2900 m_env->last_timeout = now;
2913 m_env->last_timeout = now;
2931 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2934 m_env->retry_scalar++;
2936 (do_mbedtls_handshake(c_session, m_env) < 0)) {
2951 const uint8_t *data,
2956 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
2957 coap_ssl_t *ssl_data;
2959 assert(m_env != NULL);
2961 ssl_data = &m_env->coap_ssl_data;
2962 if (ssl_data->pdu_len) {
2963 coap_log_err(
"** %s: Previous data not read %u bytes\n",
2966 ssl_data->pdu = data;
2967 ssl_data->pdu_len = (unsigned)data_len;
2969 if (m_env->established) {
2970#if COAP_CONSTRAINED_STACK
2983 ret = mbedtls_ssl_read(&m_env->ssl, pdu,
sizeof(pdu));
2992 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
2993 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
2996 case MBEDTLS_ERR_SSL_WANT_READ:
3000 "returned -0x%x: '%s' (length %" PRIdS ")\n",
3001 -ret, get_error_string(ret), data_len);
3006 ret = do_mbedtls_handshake(c_session, m_env);
3011 if (ssl_data->pdu_len) {
3013 ret = do_mbedtls_handshake(c_session, m_env);
3034 if (ssl_data && ssl_data->pdu_len) {
3036 coap_log_debug(
"coap_dtls_receive: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
3037 ssl_data->pdu_len = 0;
3038 ssl_data->pdu = NULL;
3043#if COAP_SERVER_SUPPORT
3051 const uint8_t *data,
3053#if !defined(MBEDTLS_SSL_PROTO_DTLS) || !defined(MBEDTLS_SSL_SRV_C)
3058 " libcoap not compiled for DTLS or Server Mode for Mbed TLS"
3059 " - update Mbed TLS to include DTLS and Server Mode\n");
3062 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3063 coap_ssl_t *ssl_data;
3070 c_session->
tls = m_env;
3077 if ((ret = mbedtls_ssl_set_client_transport_id(&m_env->ssl,
3080 coap_log_err(
"mbedtls_ssl_set_client_transport_id() returned -0x%x: '%s'\n",
3081 -ret, get_error_string(ret));
3085 ssl_data = &m_env->coap_ssl_data;
3086 if (ssl_data->pdu_len) {
3087 coap_log_err(
"** %s: Previous data not read %u bytes\n",
3090 ssl_data->pdu = data;
3091 ssl_data->pdu_len = (unsigned)data_len;
3093 ret = do_mbedtls_handshake(c_session, m_env);
3094 if (ret == 0 || m_env->seen_client_hello) {
3100 m_env->seen_client_hello = 0;
3106 if (ssl_data->pdu_len) {
3108 coap_log_debug(
"coap_dtls_hello: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
3109 ssl_data->pdu_len = 0;
3110 ssl_data->pdu = NULL;
3119 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3120 int expansion = mbedtls_ssl_get_record_expansion(&m_env->ssl);
3122 if (expansion == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE) {
3128#if !COAP_DISABLE_TCP
3129#if COAP_CLIENT_SUPPORT
3132#if !defined(MBEDTLS_SSL_CLI_C)
3136 " libcoap not compiled for Client Mode for Mbed TLS"
3137 " - update Mbed TLS to include Client Mode\n");
3140 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
3150 m_env->last_timeout = now;
3151 c_session->
tls = m_env;
3152 ret = do_mbedtls_handshake(c_session, m_env);
3162#if COAP_SERVER_SUPPORT
3165#if !defined(MBEDTLS_SSL_SRV_C)
3170 " libcoap not compiled for Server Mode for Mbed TLS"
3171 " - update Mbed TLS to include Server Mode\n");
3174 coap_mbedtls_env_t *m_env = coap_dtls_new_mbedtls_env(c_session,
3182 c_session->
tls = m_env;
3183 ret = do_mbedtls_handshake(c_session, m_env);
3208 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3209 size_t amount_sent = 0;
3211 assert(m_env != NULL);
3218 if (m_env->established) {
3219 while (amount_sent < data_len) {
3220 ret = mbedtls_ssl_write(&m_env->ssl, &data[amount_sent],
3221 data_len - amount_sent);
3224 case MBEDTLS_ERR_SSL_WANT_READ:
3225 case MBEDTLS_ERR_SSL_WANT_WRITE:
3232 case MBEDTLS_ERR_NET_CONN_RESET:
3233 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
3238 "returned -0x%x: '%s'\n",
3239 -ret, get_error_string(ret));
3251 ret = do_mbedtls_handshake(c_session, m_env);
3272 if (ret == (ssize_t)data_len)
3291 coap_mbedtls_env_t *m_env = (coap_mbedtls_env_t *)c_session->
tls;
3300 if (!m_env->established && !m_env->sent_alert) {
3301 ret = do_mbedtls_handshake(c_session, m_env);
3310 ret = mbedtls_ssl_read(&m_env->ssl, data, data_len);
3314 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
3318 case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
3320 m_env->sent_alert = 1;
3323#if MBEDTLS_VERSION_NUMBER >= 0x03060000
3324 case MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET:
3326 case MBEDTLS_ERR_SSL_WANT_READ:
3332 "returned -0x%x: '%s' (length %" PRIdS ")\n",
3333 -ret, get_error_string(ret), data_len);
3337 }
else if (ret < (
int)data_len) {
3338 c_session->
sock.
flags &= ~COAP_SOCKET_CAN_READ;
3362#if COAP_USE_PSA_CRYPTO || defined(MBEDTLS_PSA_CRYPTO_C)
3369#if COAP_CLIENT_SUPPORT
3370 mbedtls_free(psk_ciphers);
3371 mbedtls_free(pki_ciphers);
3372 mbedtls_free(ecjpake_ciphers);
3375 ecjpake_ciphers = NULL;
3376 processed_ciphers = 0;
3379#if COAP_USE_PSA_CRYPTO || defined(MBEDTLS_PSA_CRYPTO_C)
3380 mbedtls_psa_crypto_free();
3389 if (c_session && c_session->
tls) {
3390 coap_mbedtls_env_t *m_env;
3393 memcpy(&m_env, &c_session->
tls,
sizeof(m_env));
3395 return (
void *)&m_env->ssl;
3404#if !defined(ESPIDF_VERSION)
3414 switch ((
int)level) {
3435 mbedtls_debug_set_threshold(use_level);
3437 keep_log_level = level;
3442 return keep_log_level;
3448 version.
version = mbedtls_version_get_number();
3454#if COAP_SERVER_SUPPORT
3457 coap_crypto_sha256_ctx_t *digest_ctx = mbedtls_malloc(
sizeof(coap_crypto_sha256_ctx_t));
3460 if (coap_crypto_sha256_init(digest_ctx) != 0) {
3471 coap_crypto_sha256_free(digest_ctx);
3472 mbedtls_free(digest_ctx);
3478 const uint8_t *data,
3480 return coap_crypto_sha256_update(digest_ctx, data, data_len) == 0;
3486 int ret = coap_crypto_sha256_finish(digest_ctx, (uint8_t *)digest_buffer) == 0;
3497 coap_crypto_md_type_t md_type;
3502 md_type = COAP_CRYPTO_MD_SHA1;
3505 md_type = COAP_CRYPTO_MD_SHA256;
3508 md_type = COAP_CRYPTO_MD_SHA512;
3511 coap_log_debug(
"coap_crypto_hash: algorithm %d not supported\n", alg);
3515 hash_len = coap_crypto_hash_size(md_type);
3523 if (coap_crypto_hash_compute(md_type, data->
s, data->
length,
3524 dummy->s, hash_len, NULL) != 0) {
3534#if COAP_OSCORE_SUPPORT
3544get_cipher_key_size(
cose_alg_t alg,
size_t *key_size) {
3555 coap_log_debug(
"get_cipher_key_size: COSE cipher %d not supported\n", alg);
3565 coap_crypto_md_type_t *md_type,
3567 switch ((
int)hmac_alg) {
3570 *md_type = COAP_CRYPTO_MD_SHA256;
3576 *md_type = COAP_CRYPTO_MD_SHA384;
3582 *md_type = COAP_CRYPTO_MD_SHA512;
3587 coap_log_debug(
"get_hmac_params: COSE HMAC %d not supported\n", hmac_alg);
3594 return get_cipher_key_size(alg, NULL);
3603 return get_hmac_params(hmac_alg, NULL, NULL);
3611 size_t *max_result_len) {
3617 assert(params != NULL);
3623 if (!get_cipher_key_size(params->
alg, NULL)) {
3624 coap_log_debug(
"coap_crypto_aead_encrypt: algorithm %d not supported\n",
3631 if (coap_crypto_aead_encrypt_ccm(ccm->
key.
s, ccm->
key.
length,
3633 aad ? aad->
s : NULL, aad ? aad->length : 0,
3634 data->s, data->length,
3635 result, *max_result_len, max_result_len,
3636 ccm->tag_len) != 0) {
3649 size_t *max_result_len) {
3655 assert(params != NULL);
3661 if (!get_cipher_key_size(params->
alg, NULL)) {
3662 coap_log_debug(
"coap_crypto_aead_decrypt: algorithm %d not supported\n",
3674 if (coap_crypto_aead_decrypt_ccm(ccm->
key.
s, ccm->
key.
length,
3676 aad ? aad->
s : NULL, aad ? aad->length : 0,
3677 data->s, data->length,
3678 result, *max_result_len, max_result_len,
3679 ccm->tag_len) != 0) {
3692 coap_crypto_md_type_t md_type;
3700 if (!get_hmac_params(hmac_alg, &md_type, &mac_len)) {
3701 coap_log_debug(
"coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
3709 if (coap_crypto_hmac_compute(md_type, key->
s, key->
length,
3711 dummy->s, mac_len, NULL) != 0) {
3729#pragma GCC diagnostic ignored "-Wunused-function"
#define COAP_SERVER_SUPPORT
const char * coap_socket_strerror(void)
#define COAP_RXBUFFER_SIZE
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
Library specific build wrapper for coap_internal.h.
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
void coap_dtls_free_context(void *handle COAP_UNUSED)
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
void coap_digest_free(coap_digest_ctx_t *digest_ctx)
Free off coap_digest_ctx_t.
int coap_digest_final(coap_digest_ctx_t *digest_ctx, coap_digest_t *digest_buffer)
Finalize the coap_digest information into the provided digest_buffer.
int coap_digest_update(coap_digest_ctx_t *digest_ctx, const uint8_t *data, size_t data_len)
Update the coap_digest information with the next chunk of data.
coap_digest_ctx_t * coap_digest_setup(void)
Initialize a coap_digest.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
void coap_ticks(coap_tick_t *t)
Returns the current value of an internal tick counter.
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
void * coap_tls_new_server_session(coap_session_t *coap_session)
Create a TLS new server-side session.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
void * coap_dtls_new_client_session(coap_session_t *coap_session)
Create a new client-side session.
void * coap_dtls_new_server_session(coap_session_t *coap_session)
Create a new DTLS server-side session.
int coap_dtls_hello(coap_session_t *coap_session, const uint8_t *data, size_t data_len)
Handling client HELLO messages from a new candiate peer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
int coap_dtls_context_set_spsk(coap_context_t *coap_context, coap_dtls_spsk_t *setup_data)
Set the DTLS context's default server PSK information.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
void * coap_tls_new_client_session(coap_session_t *coap_session)
Create a new TLS client-side session.
#define COAP_DTLS_RETRANSMIT_COAP_TICKS
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_KEY_ROOT_CA
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
@ COAP_TLS_LIBRARY_MBEDTLS
Using Mbed TLS library.
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
#define coap_lock_callback_ret(r, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
#define coap_log_emerg(...)
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
#define coap_dtls_log(level,...)
Logging function.
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
#define coap_log_warn(...)
#define coap_log_err(...)
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
@ COSE_HMAC_ALG_HMAC384_384
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_HMAC_ALG_HMAC512_512
@ COSE_ALGORITHM_SHA_256_256
@ COSE_ALGORITHM_AES_CCM_16_64_128
@ COSE_ALGORITHM_AES_CCM_16_64_256
coap_proto_t
CoAP protocol types Note: coap_layers_coap[] needs updating if extended.
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
#define COAP_PROTO_NOT_RELIABLE(p)
@ COAP_SESSION_TYPE_CLIENT
client-side
@ COAP_SESSION_STATE_HANDSHAKE
@ COAP_SESSION_STATE_NONE
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
coap_address_t remote
remote address and port
CoAP binary data definition with const data.
size_t length
length of binary data
const uint8_t * s
read-only binary data
CoAP binary data definition.
The CoAP stack's global state is stored in a coap_context_t object.
uint8_t testing_cids
Change client's source port every testing_cids.
coap_dtls_spsk_t spsk_setup_data
Contains the initial PSK server setup data.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
cose_alg_t alg
The COSE algorith to use.
The structure used for defining the Client PSK setup data to be used.
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
char * client_sni
If not NULL, SNI to use in client TLS setup.
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
The structure that holds the PKI key information.
coap_pki_key_define_t define
for definable type keys
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
The structure used for defining the PKI setup data to be used.
uint8_t allow_no_crl
1 ignore if CRL not there
void * cn_call_back_arg
Passed in to the CN callback function.
uint8_t allow_short_rsa_length
1 if small RSA keysizes are allowed
uint8_t cert_chain_validation
1 if to check cert_chain_verify_depth
uint8_t allow_bad_md_hash
1 if unsupported MD hashes are allowed
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
uint8_t check_cert_revocation
1 if revocation checks wanted
uint8_t cert_chain_verify_depth
recommended depth is 3
uint8_t allow_expired_certs
1 if expired certs are allowed
uint8_t verify_peer_cert
Set to COAP_DTLS_PKI_SETUP_VERSION to support this version of the struct.
uint8_t allow_self_signed
1 if self-signed certs are allowed.
coap_dtls_cn_callback_t validate_cn_call_back
CN check callback function.
uint8_t allow_expired_crl
1 if expired crl is allowed
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
uint8_t check_common_ca
1 if peer cert is to be signed by the same CA as the local cert
The structure that holds the Server Pre-Shared Key and Identity Hint information.
The structure used for defining the Server PSK setup data to be used.
coap_dtls_psk_sni_callback_t validate_sni_call_back
SNI check callback function.
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
void * id_call_back_arg
Passed in to the Identity callback function.
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
void * sni_call_back_arg
Passed in to the SNI callback function.
coap_layer_write_t l_write
coap_layer_establish_t l_establish
coap_const_char_ptr_t public_cert
define: Public Cert
coap_const_char_ptr_t private_key
define: Private Key
coap_const_char_ptr_t ca
define: Common CA Certificate
size_t public_cert_len
define Public Cert length (if needed)
size_t ca_len
define CA Cert length (if needed)
coap_pki_define_t private_key_def
define: Private Key type definition
size_t private_key_len
define Private Key length (if needed)
coap_pki_define_t ca_def
define: Common CA type definition
coap_pki_define_t public_cert_def
define: Public Cert type definition
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
unsigned int dtls_timeout_count
dtls setup retry counter
coap_endpoint_t * endpoint
session's endpoint
coap_socket_t sock
socket object for the session, if any
coap_session_state_t state
current state of relationship with peer
coap_bin_const_t * client_cid
Contains client CID or NULL.
coap_addr_tuple_t addr_info
remote/local address info
coap_proto_t proto
protocol used
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
uint8_t negotiated_cid
Set for a client if CID negotiated.
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_session_type_t type
client or server side socket
coap_context_t * context
session's context
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
The structure used for returning the underlying (D)TLS library information.
uint64_t built_version
(D)TLS Built against Library Version
coap_tls_library_t type
Library type.
uint64_t version
(D)TLS runtime Library Version
const char * s_byte
signed char ptr
const uint8_t * u_byte
unsigned char ptr